Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data

被引:0
作者
Nakahara, Masataka [1 ]
Okui, Norihiro [1 ]
Kobayashi, Yasuaki [1 ]
Miyake, Yutaka [1 ]
Kubota, Ayumu [1 ]
机构
[1] KDDI Res Inc, Cyber Secur Lab, Saitama, Japan
关键词
IoT; malware detection; machine learning; IPFIX; whitelist; data reduction; CHALLENGES;
D O I
10.1080/17517575.2022.2142854
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the security of IoT devices, the number and type of devices are generally large, so it is important to collect data efficiently and detect threats in a lightweight way. In this paper, we propose the architecture for malware detection, a method to detect malware using flow information, and a method to decrease the amount of transmission data between the servers in this architecture. We evaluate the performance of malware detection and the amount of data before and after the data reduction. And show that the performance of malware detection is maintained even though the amount of data is reduced.
引用
收藏
页数:19
相关论文
共 42 条
[1]   Feature Subset Selection for Malware Detection in Smart IoT Platforms [J].
Abawajy, Jemal ;
Darem, Abdulbasit ;
Alhashmi, Asma A. .
SENSORS, 2021, 21 (04) :1-19
[2]   Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment [J].
Abdel-Basset, Mohamed ;
Chang, Victor ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7704-7715
[3]   Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest [J].
Ahmed, Saeed ;
Lee, YoungDoo ;
Hyun, Seung-Ho ;
Koo, Insoo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) :2765-2777
[4]  
Albasir A., 2021, J SURVEILLANCE SECUR, V2, P1, DOI DOI 10.20517/JSSS.2020.19
[5]   Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches [J].
Alrubayyi, Hadeel ;
Goteng, Gokop ;
Jaber, Mona ;
Kelly, James .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2021, 10 (04)
[6]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[7]   A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions [J].
Asharf, Javedz ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Debie, Essam ;
Haider, Waqas ;
Wahab, Abdul .
ELECTRONICS, 2020, 9 (07)
[8]   Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security [J].
Atat, Rachad ;
Liu, Lingjia ;
Chen, Hao ;
Wu, Jinsong ;
Li, Hongxiang ;
Yi, Yang .
IET Cyber-Physical Systems: Theory and Applications, 2017, 2 (01) :49-54
[9]  
Bendiab G, 2020, PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, P444, DOI 10.1109/NetSoft48620.2020.9165381
[10]   Unsupervised machine learning for network-centric anomaly detection in IoT [J].
Bhatia, Randeep ;
Benno, Steven ;
Esteban, Jairo ;
Lakshman, T., V ;
Grogan, John .
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS, 2019, :42-48