A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

被引:90
作者
Gaurav, Akshat [1 ]
Gupta, Brij B. [2 ,3 ,4 ]
Panigrahi, Prabin Kumar [5 ]
机构
[1] Ronin Inst, Montclair, NJ USA
[2] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[4] Staffordshire Univ, Stoke On Trent ST4 2DE, Staffs, England
[5] Indian Inst Management Indore, Indore, India
关键词
Network function virtualisation; enterprise information system; IoT; malware detection; adversarial malware detection; malware visualisation techniques; sandboxing; FEATURE-SELECTION; DEEP; NETWORKS; DEFENSE; ATTACKS; DDOS; VIRTUALIZATION; FRAMEWORK; INTERNET; TAXONOMY;
D O I
10.1080/17517575.2021.2023764
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a relatively new technology that has piqued academics' and business information systems' attention in recent years. The Internet of Things establishes a network that enables smart devices in an organisational information system to connect to one another and exchange data with the central storage. Android apps are placed on Android apps to enhance the user-friendliness of IoT devices in business information systems, making them more interactive and user-friendly. However, the usage of Android apps makes IoT devices susceptible to all forms of malware attacks, including those that attempt to hack into IoT devices and get access to sensitive information stored in the corporate information system. The researchers offered a variety of attack mitigation approaches for detecting harmful malware embedded in an Android application operating on an IoT device. In this context, machine learning offered the most promising strategies to detect malware attacks in IoT-based enterprise information systems because of its better accuracy and precision. Its capacity to adapt to new forms of malware attacks is a result of its learning capabilities. Therefore, we conduct a detailed survey, which discusses emerging machine learning algorithms for detecting malware in business information systems powered by the Internet of Things. This article reviews all available research on malware detection, including static malware detection, dynamic malware detection, promoted malware detection and hybrid malware detection.
引用
收藏
页数:25
相关论文
共 161 条
[21]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[22]   LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning [J].
Backes, Michael ;
Nauman, Mohammad .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :204-217
[23]   ZSM Security: Threat Surface and Best Practices [J].
Benzaid, Chafika ;
Taleb, Tarik .
IEEE NETWORK, 2020, 34 (03) :124-133
[24]  
Bhunia Suman Sankar, 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), P1, DOI 10.1109/ATNAC.2017.8215418
[25]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[26]   Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection [J].
Canfora, Gerardo ;
Medvet, Eric ;
Mercaldo, Francesco ;
Visaggio, Corrado Aaron .
IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, :50-57
[27]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[28]   Improving IoT Botnet Investigation Using an Adaptive Network Layer [J].
Ceron, Joao Marcelo ;
Steding-Jessen, Klaus ;
Hoepers, Cristine ;
Granville, Lisandro Zambenedetti ;
Margi, Cintia Borges .
SENSORS, 2019, 19 (03)
[29]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[30]  
Chan PPK, 2014, INT CONF MACH LEARN, P82, DOI 10.1109/ICMLC.2014.7009096