2018
DOI: 10.1016/j.future.2018.03.007
|View full text |Cite
|
Sign up to set email alerts
|

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
128
0
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 322 publications
(133 citation statements)
references
References 17 publications
0
128
0
5
Order By: Relevance
“…Various types of neural networks have been proposed in the literature, e.g. Multi-Layer Perceptron (MLP), Convolutional Neural Networks (CNNs), and Recurrent Neural Networks (RNNs) [81], [82], [83].…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 99%
See 1 more Smart Citation
“…Various types of neural networks have been proposed in the literature, e.g. Multi-Layer Perceptron (MLP), Convolutional Neural Networks (CNNs), and Recurrent Neural Networks (RNNs) [81], [82], [83].…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 99%
“…3) DL-based malware analysis in IoT: Pajouh et al [81] proposed an RNN-based DL approach for malware analysis technique in IoT. The authors considered Advanced RISC Machines (ARM)-based applications in IoT.…”
Section: E Malware Analysis In Iotmentioning
confidence: 99%
“…Previous literature have suggested the potential of leveraging machine learning to enhance security threat hunting, but it is not practical to simply integrate machine learning in static and dynamic cyber security analysis due to the wide variety and distribution of IoT devices, particularly for (inexpensive) IoT devices with limited processing power [12]. On the other hand, the success of deep learning (DL) in various big data fields has attracted noticeable interest in cybersecurity fields.…”
Section: B Deep Learning For Attack Detectionmentioning
confidence: 99%
“…This type of structure is theoretically well suited and has been proven a powerful model for tagging tasks with applications in natural language processing, machine translation, Image recognition, and the like [17]. A bidirectional LSTM (BLSTM), furthermore, introduces two independent layers to accumulate contextual information both from the past and the future [12]. The main contribution of this paper is the application of the variants of LSTM networks for implementing deep learning in network traffic analysis aimed at detecting botnet attacks.…”
Section: B Deep Learning For Attack Detectionmentioning
confidence: 99%
“…The volume, complexity and variety of Cyber attacks are continually increasing. This trend is currently being driven by cyber warfare and the emergence of the Internet of Things [1][2][3]. The annual cost of cyber attacks was $3 trillion in 2015 and it is expected to increase to more than $6 trillion per annum by 5 2021 [4].…”
Section: Introductionmentioning
confidence: 99%