Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices

被引:2
|
作者
Habib, Faiza [1 ]
Shirazi, Syed Hamad [2 ]
Aurangzeb, Khursheed [3 ]
Khan, Asfandyar [2 ]
Bhushan, Bharat [4 ]
Alhussein, Musaed [3 ]
机构
[1] Abasyn Univ, Dept Comp Sci, Islamabad Campus, Islamabad 44000, Pakistan
[2] Hazara Univ Mansehra, Dept Comp Sci, Mansehra 21300, Pakistan
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11543, Saudi Arabia
[4] Sharda Univ, Sch Engn & Technol, Dept Comp Sci & Engn, Greater Noida 201310, India
关键词
Malware; Internet of Things; Deep learning; Internet; Codes; Biological system modeling; Training; Security; Computer security; IoT security; metamorphic malware detection; deep learning; Malimg dataset; cyber security; DYNAMIC-ANALYSIS; INTERNET;
D O I
10.1109/ACCESS.2024.3383831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.
引用
收藏
页码:48570 / 48582
页数:13
相关论文
共 50 条
  • [21] Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network
    Alsekait, Deema
    Zakariah, Mohammed
    Amin, Syed Umar
    Khan, Zafar Iqbal
    Alqurni, Jehad Saad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (02): : 2395 - 2436
  • [22] Online Neural Networks for Smart IoT Devices
    Choi, Kwontaeg
    Yu, Sunjin
    ADVANCED SCIENCE LETTERS, 2018, 24 (03) : 1964 - 1969
  • [23] Partitioning Deep Neural Networks for Optimally Pipelined Inference on Heterogeneous IoT Devices with Low Latency Networks
    Sect, Woobean
    Kim, Saehwa
    Hong, Seongsoo
    2024 IEEE 44TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS 2024, 2024, : 1470 - 1471
  • [24] Image-based malware analysis for enhanced IoT security in smart cities
    Dong, Huiyao
    Kotenko, Igor
    INTERNET OF THINGS, 2024, 27
  • [25] An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
    Saharkhizan, Mahdis
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    Parizi, Reza M.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8852 - 8859
  • [26] Detecting attacks on IoT devices with probabilistic Bayesian neural networks and hunger games search optimization approaches
    Togacar, Mesut
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (01)
  • [27] Deep Learning Models for Cyber Security in IoT Networks
    Roopak, Monika
    Tian, Gui Yun
    Chambers, Jonathon
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 452 - 457
  • [28] Memory-Based Pruning of Deep Neural Networks for IoT Devices Applied to Flood Detection
    Fernandes Junior, Francisco Erivaldo
    Nonato, Luis Gustavo
    Ranieri, Caetano Mazzoni
    Ueyama, Jo
    SENSORS, 2021, 21 (22)
  • [29] Resource-adaptive and OOD-robust inference of deep neural networks on IoT devices
    Robertson, Cailen
    Tong, Ngoc Anh
    Nguyen, Thanh Toan
    Nguyen, Quoc Viet Hung
    Jo, Jun
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2025, 10 (01) : 115 - 133
  • [30] Evolving deep neural networks architectures for Android malware classification
    Martin, Alejandro
    Fuentes-Hurtado, Felix
    Naranjo, Valery
    Camacho, David
    2017 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2017, : 1659 - 1666