AI-empowered malware detection system for industrial internet of things

被引:6
作者
Smmarwar S.K. [1 ]
Gupta G.P. [1 ]
Kumar S. [1 ]
机构
[1] Department of Information Technology, National Institute of Technology, Raipur
关键词
CNN-LSTM; Cyber-attacks; Deep learning; Double-density discrete wavelet transform; Industrial internet of things; Malware detection;
D O I
10.1016/j.compeleceng.2023.108731
中图分类号
学科分类号
摘要
With the significant growth in Industrial Internet of Things (IIoT) technologies, various IIoT-based applications have emerged in the last decade. In recent years, various malware-based cyber-attacks have been reported on IIoT-based systems. Thus, this research work outlines the design of an efficient Artificial Intelligence (AI)-empowered zero-day malware detection system for IIoT. In this paper, a hybrid deep learning-based malware detection framework is proposed in which a Double-Density Discrete Wavelet Transform (D3WT) is used for feature extraction and a hybrid of Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) model is used for identification and classification of malware. The assessment of the proposed framework is evaluated using three datasets such as IoT malware, Microsoft BIG-2015 and Malimg dataset. Experimental results show that the proposed model achieved 99.98% accuracy on the IoT malware, 96.97% accuracy on the Microsoft BIG-2015 and 99.96% accuracy with the Malimg dataset. © 2023 Elsevier Ltd
引用
收藏
相关论文
共 25 条
  • [1] Khan A.A., Laghari A.A., Gadekallu T.R., Shaikh Z.A., Javed A.R., Rashid M., Estrela V.V., Mikhaylov A., A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment, Comput Electr Eng, 102, July, (2022)
  • [2] Alzubi J.A., Manikandan R., Alzubi O.A., Qiqieh I., Rahim R., Gupta D., Khanna A., Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud, Meas J Int Meas Confed, 150, (2020)
  • [3] Heiney S., Industrial internet of things (IIoT) Security: everything you need to know, Impero, (2022)
  • [4] Vaiyapuri T., Algamdi S., John R., Sbai Z., Al-helal M., Alkhayyat A., Gupta D., Metaheuristics with federated learning enabled intrusion detection system in Internet of Things environment, Expert Syst, (2022)
  • [5] Smmarwar S.K., Gupta G.P., Kumar S., Deep malware detection framework for IoT- based smart agriculture, Comput Electr Eng, 104, PA, (2022)
  • [6] Chethana C., Pareek P.K., Costa De Albuquerque V.H., Khanna A., Gupta D., Deep learning technique based intrusion detection in cyber-security networks, MysuruCon 2022 - 2022 IEEE 2nd Mysore Sub Sect. Int. Conf., pp. 1-7, (2022)
  • [7] Dhalaria M., Gandotra E., Gupta D., Comparative Analysis of Feature Selection Methods for Detection of Android Malware, (2022)
  • [8] Verma V., Muttoo S.K., Singh V.B., Multiclass malware classification via first- and second-order texture statistics, Comput Secur, 97, (2020)
  • [9] Gao X., Hu C., Shan C., Liu B., Niu Z., Xie H., Malware classification for the cloud via semi-supervised transfer learning, J Inf Secur Appl, 55, October, (2020)
  • [10] Sudhakar, Kumar S., MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things, Futur Gener Comput Syst, 125, pp. 334-351, (2021)