Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices

被引:2
作者
Habib, Faiza [1 ]
Shirazi, Syed Hamad [2 ]
Aurangzeb, Khursheed [3 ]
Khan, Asfandyar [2 ]
Bhushan, Bharat [4 ]
Alhussein, Musaed [3 ]
机构
[1] Abasyn Univ, Dept Comp Sci, Islamabad Campus, Islamabad 44000, Pakistan
[2] Hazara Univ Mansehra, Dept Comp Sci, Mansehra 21300, Pakistan
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11543, Saudi Arabia
[4] Sharda Univ, Sch Engn & Technol, Dept Comp Sci & Engn, Greater Noida 201310, India
关键词
Malware; Internet of Things; Deep learning; Internet; Codes; Biological system modeling; Training; Security; Computer security; IoT security; metamorphic malware detection; deep learning; Malimg dataset; cyber security; DYNAMIC-ANALYSIS; INTERNET;
D O I
10.1109/ACCESS.2024.3383831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.
引用
收藏
页码:48570 / 48582
页数:13
相关论文
共 50 条
  • [41] Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification
    Rajarajan, S.
    Kavitha, M. G.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (02):
  • [42] Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
    Chauhan, Jagmohan
    Seneviratne, Suranga
    Hu, Yining
    Misra, Archan
    Seneviratne, Aruna
    Lee, Youngki
    COMPUTER, 2018, 51 (05) : 60 - 67
  • [43] Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks
    Papachristou, Konstantinos
    Theodorou, Traianos
    Papadopoulos, Stavros
    Protogerou, Aikaterini
    Drosou, Anastasios
    Tzovaras, Dimitrios
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [44] Partitioning Convolutional Neural Networks to Maximize the Inference Rate on Constrained IoT Devices
    Campos de Oliveira, Fabiola Martins
    Bonin, Edson
    FUTURE INTERNET, 2019, 11 (10)
  • [45] Efficient Execution of Deep Neural Networks on Mobile Devices with NPU
    Tan, Tianxiang
    Cao, Guohong
    IPSN'21: PROCEEDINGS OF THE 20TH ACM/IEEE CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2021, : 283 - 298
  • [46] Malware Detection in Internet of Things (IoT) Devices Using Deep Learning
    Riaz, Sharjeel
    Latif, Shahzad
    Usman, Syed Muhammad
    Ullah, Syed Sajid
    Algarni, Abeer D.
    Yasin, Amanullah
    Anwar, Aamir
    Elmannai, Hela
    Hussain, Saddam
    SENSORS, 2022, 22 (23)
  • [47] IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    Salehi, S. Ahmad
    COMPUTERS & SECURITY, 2024, 146
  • [48] Neural Networks and Cyber Resilience: Deep Insights into AI Architectures for Robust Security Framework
    Dari, Sukhvinder Singh
    Thool, Komal Umare
    Deshpande, Yogesh D.
    Aush, Mithun G.
    Patil, Vivek D.
    Bendale, Shailesh P.
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (03) : 78 - 95
  • [49] Detecting Android Malware With Pre-Existing Image Classification Neural Networks
    Zhang, Chenhao
    Yin, Shuijun
    Li, Heng
    Cai, Minghui
    Yuan, Wei
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 858 - 862
  • [50] Enhancing Neural Architecture Search With Multiple Hardware Constraints for Deep Learning Model Deployment on Tiny IoT Devices
    Burrello, Alessio
    Risso, Matteo
    Motetti, Beatrice Alessandra
    Macii, Enrico
    Benini, Luca
    Pagliari, Daniele Jahier
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (03) : 780 - 794