Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices

被引:2
作者
Habib, Faiza [1 ]
Shirazi, Syed Hamad [2 ]
Aurangzeb, Khursheed [3 ]
Khan, Asfandyar [2 ]
Bhushan, Bharat [4 ]
Alhussein, Musaed [3 ]
机构
[1] Abasyn Univ, Dept Comp Sci, Islamabad Campus, Islamabad 44000, Pakistan
[2] Hazara Univ Mansehra, Dept Comp Sci, Mansehra 21300, Pakistan
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11543, Saudi Arabia
[4] Sharda Univ, Sch Engn & Technol, Dept Comp Sci & Engn, Greater Noida 201310, India
关键词
Malware; Internet of Things; Deep learning; Internet; Codes; Biological system modeling; Training; Security; Computer security; IoT security; metamorphic malware detection; deep learning; Malimg dataset; cyber security; DYNAMIC-ANALYSIS; INTERNET;
D O I
10.1109/ACCESS.2024.3383831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.
引用
收藏
页码:48570 / 48582
页数:13
相关论文
共 50 条
  • [21] Detecting Malware Code as Video With Compressed, Time-Distributed Neural Networks
    Santacroce, Michael L.
    Koranek, Daniel
    Jha, Rashmi
    IEEE ACCESS, 2020, 8 : 132748 - 132760
  • [22] Enhanced RF Fingerprinting for IoT Devices with Recurrent Neural Networks
    Merchant, Kevin
    Nousain, Bryan
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [23] A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks
    Alghamdi, Rubayyi
    Bellaiche, Martine
    COMPUTERS & SECURITY, 2023, 125
  • [24] IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security
    Shirley, C. P.
    Kumar, Jaydip
    Rane, Kantilal Pitambar
    Kumar, Narendra
    Rani, Deevi Radha
    Harshitha, Kuntamukkula
    Tiwari, Mohit
    JOURNAL OF HIGH SPEED NETWORKS, 2024, 30 (02) : 191 - 201
  • [25] Routing Policy Verification for Enhanced Energy Quality of Service and Security Monitoring in IoT Networks
    Papachristou, Konstantinos
    Theodorou, Traianos-Ioannis
    Papadopoulos, Stavros
    Protogerou, Aikaterini
    Drosou, Anastasios
    Tzovaras, Dimitrios
    PROCEEDINGS OF THE 23RD PAN-HELLENIC CONFERENCE OF INFORMATICS (PCI 2019), 2019, : 43 - 48
  • [26] Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks
    Gupta, Brij B.
    Gaurav, Akshat
    Arya, Varsha
    Attar, Razaz Waheeb
    Bansal, Shavi
    Alhomoud, Ahmed
    Chui, Kwok Tai
    Computers, Materials and Continua, 2024, 81 (03) : 4109 - 4124
  • [27] A Data-plane Approach for Detecting Malware in IoT Networks
    Gaikar, Mrunal Hareshwar
    Haribabu, K.
    2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 578 - 583
  • [28] Secure image classification with deep neural networks for IoT applications
    Hassan, Abdelrhman
    Liu, Fei
    Wang, Fanchuan
    Wang, Yong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (08) : 8319 - 8337
  • [29] Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain
    Nazir, Ahsan
    He, Jingsha
    Zhu, Nafei
    Anwar, Muhammad Shahid
    Pathan, Muhammad Salman
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 8367 - 8392
  • [30] Deep Learning Models for Cyber Security in IoT Networks
    Roopak, Monika
    Tian, Gui Yun
    Chambers, Jonathon
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 452 - 457