Deep Image: A precious image based deep learning method for online malware detection in IoT environment

被引:8
作者
Ghahramani, Meysam [1 ]
Taheri, Rahim [2 ]
Shojafar, Mohammad [3 ]
Javidan, Reza [4 ]
Wan, Shaohua [5 ]
机构
[1] Lorestan Univ, Fac Basic Sci, Dept Math & Comp Sci, Lorestan, Iran
[2] Univ Portsmouth, Fac Technol, Sch Comp, Portsmouth, England
[3] Univ Surrey, 5G 6G Innovat Ctr 5G 6GIC, Inst Commun Syst ICS, Guildford, England
[4] Shiraz Univ Technol, Comp Engn & IT Dept, Shiraz, Iran
[5] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan, Hubei, Peoples R China
关键词
Malware detection; Image-based clustering; Deep learning; IoT devices; Visualization analysis;
D O I
10.1016/j.iot.2024.101300
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, we address the challenge of online malware detection for IoT devices. We propose a method that monitors malware behavior, extracts dynamic features, and converts them into sparse binary images for analysis. The primary problem is to identify the most effective approach among clustering, probabilistic, and deep learning methods for analyzing this unique image dataset. We extract dynamic features from the monitored malware behavior, transforming them into binary images, which are then subjected to three different analysis methods. The clustering, probabilistic, and deep learning approaches are compared and evaluated in terms of various metrics. Our study contributes insights into the performance of various online malware detection approaches for IoT devices. We demonstrate that deep learning outperforms other methods, achieving the best results in seven out of eight metrics. The results of our analysis reveal that the deep learning approach exhibits the highest accuracy in seven of the eight evaluated metrics. We found that the lattice-based approach consistently returns the maximum maliciousness level, which can be instrumental in label flipping scenarios.
引用
收藏
页数:17
相关论文
共 18 条
[1]   Malware Detection in Cloud Computing using an Image Visualization Technique [J].
Abdullayeva, Fargana .
2019 IEEE 13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2019), 2019, :201-205
[2]  
Baptista I, 2018, Binary Visualisation for Malware Detection
[3]   DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling [J].
Cai, Haipeng ;
Meng, Na ;
Ryder, Barbara ;
Yao, Daphne .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1455-1470
[4]  
Dheeru Dua and Casey Graff, 2017, UCI machine learning repository
[5]   Analysis of internet of things malware using image texture features and machine learning techniques [J].
Evanson, Mwangi Karanja ;
Shedden, Masupe ;
Jeffrey, Mandu Gasennelwe .
INTERNET OF THINGS, 2020, 9
[6]   A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway [J].
Hu, Xiaoyan ;
Zhu, Cheng ;
Cheng, Guang ;
Li, Ruidong ;
Wu, Hua ;
Gong, Jian .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (05) :3814-3826
[7]   A New Adaptive Learning Algorithm and Its Application to Online Malware Detection [J].
Huynh, Ngoc Anh ;
Ng, Wee Keong ;
Ariyapala, Kanishka .
DISCOVERY SCIENCE, DS 2017, 2017, 10558 :18-32
[8]   Analysis of ResNet and GoogleNet models for malware detection [J].
Khan, Riaz Ullah ;
Zhang, Xiaosong ;
Kumar, Rajesh .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (01) :29-37
[9]   Deep learning at the shallow end: Malware classification for non-domain experts [J].
Le, Quan ;
Boydell, Oisin ;
Mac Namee, Brian ;
Scanlon, Mark .
DIGITAL INVESTIGATION, 2018, 26 :S118-S126
[10]   Static detection of malicious PowerShell based on word embeddings [J].
Mimura, Mamoru ;
Tajiri, Yui .
INTERNET OF THINGS, 2021, 15