Attention-Based Multidimensional Deep Learning Approach for Cross-Architecture IoMT Malware Detection and Classification in Healthcare Cyber-Physical Systems

被引:33
作者
Ravi, Vinayakumar [1 ]
Pham, Tuan D. [1 ]
Alazab, Mamoun [2 ]
机构
[1] Prince Mohammad Bin Fahd Univ, Ctr Artificial Intelligence, Khobar 31952, Saudi Arabia
[2] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0820, Australia
关键词
Malware; Feature extraction; Internet of Things; Medical services; Ground penetrating radar; Geophysical measurement techniques; Computer architecture; Cybercrime; cybersecurity; deep learning (DL); federated learning; healthcare; Internet of Medical Things (IoMT); malware; INTERNET; ATTACKS;
D O I
10.1109/TCSS.2022.3198123
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A literature survey shows that the number of malware attacks is gradually growing over the years due to the growing trend of Internet of Medical Things (IoMT) devices. To detect and classify malware attacks, automated malware detection and classification is an essential subsystem in healthcare cyber-physical systems. This work proposes an attention-based multidimensional deep learning (DL) approach for a cross-architecture IoMT malware detection and classification system based on byte sequences extracted from Executable and Linkable Format (ELF; formerly named Extensible Linking Format) files. The DL approach automates the feature design and extraction process from unstructured byte sequences. In addition, the proposed approach facilitates the detection of the central processing unit (CPU) architecture of the ELF file. A detailed experimental analysis and its evaluation are shown on the IoMT cross-architecture benchmark dataset. In all the experiments, the proposed method showed better performance compared with those obtained from several existing methods with an accuracy of 95% for IoMT malware detection, 94% for IoMT malware classification, and 95% for CPU architectures classification. The proposed method also suggests a similar performance with an accuracy of 94% on the Microsoft malware dataset. Experimental results on two malware datasets indicate that the proposed method is robust and generalizable in cross-architecture IoMT malware detection, classification, and CPU architectures classification in healthcare cyber-physical systems.
引用
收藏
页码:1597 / 1606
页数:10
相关论文
共 41 条
[1]   Peripheral Blood Smear Analysis Using Automated Computer-Aided Diagnosis System to Identify Acute Myeloid Leukemia [J].
Acharya, Vasundhara ;
Ravi, Vinayakumar ;
Pham, Tuan D. ;
Chakraborty, Chinmay .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (08) :2760-2773
[2]   An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems [J].
Adil, Muhammad ;
Khan, Muhammad Khurram ;
Jadoon, Muhammad Mohsin ;
Attique, Muhammad ;
Song, Houbing ;
Farouk, Ahmed .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05) :2719-2730
[3]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[4]  
Alhanahnah M, 2018, IEEE CONF COMM NETW
[5]  
Alrawi O, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3505
[6]   A deep learning system for health care IoT and smartphone malware detection [J].
Amin, Muhammad ;
Shehwar, Duri ;
Ullah, Abrar ;
Guarda, Teresa ;
Tanveer, Tamleek Ali ;
Anwar, Sajid .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (14) :11283-11294
[7]  
[Anonymous], 2020, TASK 2 IOTMAL2020 CD
[8]  
Bhuyan H., 2022, IEEE Trans. Eng. Manag., DOI [10.1109/TEM.2021.3065699, DOI 10.1109/TEM.2021.3065699]
[9]   An investigation and comparison of machine learning approaches for intrusion detection in IoMT network [J].
Binbusayyis, Adel ;
Alaskar, Haya ;
Vaiyapuri, Thavavel ;
Dinesh, M. .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (15) :17403-17422
[10]  
Dinakarrao SMP, 2019, DES AUT TEST EUROPE, P776, DOI [10.23919/DATE.2019.8715057, 10.23919/date.2019.8715057]