IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2021
DOI: 10.1109/infocomwkshps51825.2021.9484483
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Negative and Positive Selection Algorithm to Detect Unknown Malware in the IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 19 publications
1
16
0
Order By: Relevance
“…The challenge of adapting cybersecurity measures to the dynamic and evolving nature of hospital networks has been a focal point of recent research [21,22,23]. Studies have particularly concentrated on developing adaptive algorithms capable of accommodating frequent changes in network configurations, such as the addition or removal of medical devices and applications [24,8]. Researchers have employed a variety of statistical methods and advanced machine learning techniques to enhance the detection of anomalies in real-time [25,26,27].…”
Section: Anomaly Detection Techniques In Dynamic Networkmentioning
confidence: 99%
“…The challenge of adapting cybersecurity measures to the dynamic and evolving nature of hospital networks has been a focal point of recent research [21,22,23]. Studies have particularly concentrated on developing adaptive algorithms capable of accommodating frequent changes in network configurations, such as the addition or removal of medical devices and applications [24,8]. Researchers have employed a variety of statistical methods and advanced machine learning techniques to enhance the detection of anomalies in real-time [25,26,27].…”
Section: Anomaly Detection Techniques In Dynamic Networkmentioning
confidence: 99%
“…Besides, Yu et al [ 43 ] suggested a home security smart analytics system utilizing a home router that classifies and identifies malware based on protocol, address, and main content of packets as features. Alrubayyi et al [ 44 ] designed an algorithm based on forward and backward selection techniques. The algorithm used 16-bit strings generated from target port-based network traffic as features and matched them with existing features to detect malware.…”
Section: Related Workmentioning
confidence: 99%
“…There are multiple methods to combat/detect malware attacks but these are often too complex to run on lightweight IoT devices (Alrubayyi et al, 2021a). An artificial immune system method for malware detection is proposed in (Alrubayyi et al, 2021b) which is highly effective and suitable for Intelligent IoT systems as it has low complexity and the ability to detect unseen malware. However, malware detection does not address the risk of manin-the-middle, a security breach that targets the communication network for eavesdropping or altering the transmitted data; in this context, private/personal data.…”
Section: Challenges Of Meeting Multi-objective Sdgsmentioning
confidence: 99%