A deep learning ensemble approach for malware detection in Internet of Things utilizing Explainable Artificial Intelligence

被引:1
作者
Mittal, Saksham [1 ,2 ,3 ]
Wazid, Mohammad [3 ]
Singh, Devesh Pratap [3 ]
Das, Ashok Kumar [4 ,5 ]
Hossain, M. Shamim [6 ]
机构
[1] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Deemed Be Univ, Dehra Dun 248002, India
[3] Graph Era Deemed Be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[4] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[5] Korea Univ, Coll Informat, Dept Comp Sci & Engn, Seoul 02841, South Korea
[6] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 12372, Saudi Arabia
关键词
Malware attack; Security; Explainable Artificial Intelligence; Deep learning; Ensemble learning; Long short-term memory; SECURITY;
D O I
10.1016/j.engappai.2024.109560
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been popularized these days due to digitization and automation. It is deployed in various applications, i.e., smart homes, smart agriculture, smart transportation, smart healthcare, and industrial monitoring. In an IoT network, many IoT devices communicate with servers, or users access IoT devices through an open channel via a certain exchange of messages. Besides providing many benefits like efficiency, automation, and convenience, IoT presents significant security challenges due to a lack of proper standard security measures. Thus, malicious actors maybe able to infect the network with malware. They may launch destructive attacks with the goal of stealing data or causing damage to the systems' resources. This can be mitigated by introducing intrusion detection and prevention mechanisms in the network. An intelligent intrusion detection system is required to put preventative measures in place for secure communication and a malware-free network. In this article, we propose a deep learning based ensemble approach for IoT malware attack detection (in short, we call it as DLEX-IMD) trained and tested against benchmark datasets. The important measures, including accuracy, precision, recall, and F1-score, are used to evaluate the performance of the proposed DLEX-IMD. The performance of the proposed scheme is explained utilizing benchmark Explainable Artificial Intelligence (AI) method-LIME (Local Interpretable Model-Agnostic Explanations), which justifies the reliability of the proposed model training. The DLEX-IMD is also compared with a range of other closely related existing schemes and has shown better performance than those schemes with 99.96% accuracy and F1-score of 0.999.
引用
收藏
页数:10
相关论文
共 29 条
  • [1] Ahli A., 2023, 2023 ADV SCI ENG TEC, P1
  • [2] Alfikri M.D., 2022, IEEE Internet Things J
  • [3] A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks
    Alghamdi, Rubayyi
    Bellaiche, Martine
    [J]. COMPUTERS & SECURITY, 2023, 125
  • [4] Anish Halimaa A., 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). Proceedings, P916, DOI 10.1109/ICOEI.2019.8862784
  • [5] A systematic survey on explainable AI applied to fake news detection
    Athira, A. B.
    Kumar, S. D. Madhu
    Chacko, Anu Mary
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 122
  • [6] Cascaded Look Up Table Distillation of P4 Deep Neural Network Switches
    De Marinis, Lorenzo
    Paolini, Emilio
    Abu Bakar, Rana
    Cugini, Filippo
    Paolucci, Francesco
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2111 - 2116
  • [7] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [8] Gangone A., 2023, 2023 6 INT C CONT CO, V6, P435
  • [9] A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment
    Kozik, Rafal
    Pawlicki, Marek
    Choras, Michal
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2021, 24 (04) : 1441 - 1449
  • [10] Efficient android malware identification with limited training data utilizing multiple convolution neural network techniques
    Ksibi, Amel
    Zakariah, Mohammed
    Almuqren, Latifah
    Alluhaidan, Ala Saleh
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 127