A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

被引:90
作者
Gaurav, Akshat [1 ]
Gupta, Brij B. [2 ,3 ,4 ]
Panigrahi, Prabin Kumar [5 ]
机构
[1] Ronin Inst, Montclair, NJ USA
[2] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[4] Staffordshire Univ, Stoke On Trent ST4 2DE, Staffs, England
[5] Indian Inst Management Indore, Indore, India
关键词
Network function virtualisation; enterprise information system; IoT; malware detection; adversarial malware detection; malware visualisation techniques; sandboxing; FEATURE-SELECTION; DEEP; NETWORKS; DEFENSE; ATTACKS; DDOS; VIRTUALIZATION; FRAMEWORK; INTERNET; TAXONOMY;
D O I
10.1080/17517575.2021.2023764
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a relatively new technology that has piqued academics' and business information systems' attention in recent years. The Internet of Things establishes a network that enables smart devices in an organisational information system to connect to one another and exchange data with the central storage. Android apps are placed on Android apps to enhance the user-friendliness of IoT devices in business information systems, making them more interactive and user-friendly. However, the usage of Android apps makes IoT devices susceptible to all forms of malware attacks, including those that attempt to hack into IoT devices and get access to sensitive information stored in the corporate information system. The researchers offered a variety of attack mitigation approaches for detecting harmful malware embedded in an Android application operating on an IoT device. In this context, machine learning offered the most promising strategies to detect malware attacks in IoT-based enterprise information systems because of its better accuracy and precision. Its capacity to adapt to new forms of malware attacks is a result of its learning capabilities. Therefore, we conduct a detailed survey, which discusses emerging machine learning algorithms for detecting malware in business information systems powered by the Internet of Things. This article reviews all available research on malware detection, including static malware detection, dynamic malware detection, promoted malware detection and hybrid malware detection.
引用
收藏
页数:25
相关论文
共 161 条
[1]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[2]   Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Alasmary, Hisham ;
Abuhamad, Mohammed ;
Salem, Saeed ;
Nyang, DaeHun ;
Mohaisen, Aziz .
COMPUTATIONAL DATA AND SOCIAL NETWORKS, 2019, 11917 :268-281
[3]  
Acharya T., 2007, UBIQUITY, V8, P1, DOI [10.1145/1322464.1317488, DOI 10.1145/1322464.1317488]
[4]   Iot based smart transport management and vehicle-to-vehicle communication system [J].
Agarwal V. ;
Sharma S. ;
Agarwal P. .
Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 :709-716
[5]  
Al-kasassbeh Mouhammd, 2020, Intelligent Computing. Proceedings of the 2020 Computing Conference. Advances in Intelligent Systems and Computing (AISC 1230), P391, DOI 10.1007/978-3-030-52243-8_28
[6]  
Al-Kasassbeh M., 2020, HDB COMPUTER NETWORK, P889, DOI DOI 10.1007/978-3-030-22277-2_36
[7]   Detection of IoT-botnet attacks using fuzzy rule interpolation [J].
Al-Kasassbeh, Mouhammd ;
Almseidin, Mohammad ;
Alrfou, Khaled ;
Kovacs, Szilveszter .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (01) :421-431
[8]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[9]   Graph-based malware detection using dynamic analysis [J].
Anderson, Blake ;
Quist, Daniel ;
Neil, Joshua ;
Storlie, Curtis ;
Lane, Terran .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :247-258
[10]  
Anderson H. S., 2017, BLACK HAT C, P1