2021
DOI: 10.3390/electronics10111241
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Mirai Malware Detection for IoT Nodes

Abstract: The advancement in recent IoT devices has led to catastrophic attacks on the devices resulting in breaches in user privacy and exhausting resources of various organizations, so that users and organizations expend increased time and money. One such harmful malware is Mirai, which has created worldwide recognition by impacting the digital world. There are several ways to detect Mirai, but the Machine Learning approach has proved to be accurate and reliable in detecting malware. In this research, a novel-based ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…Furthermore, the AUC, accuracy, precision, recall, specificity, and F1-score were calculated from Confusion Matrices to evaluate the classification capability of each model. 26 Finally, the two models with the highest average AUC in validation sets were chosen without affecting the accuracy of classification efficiency. We selected the random forest and the XGBoost models and mapped the most important top 20 genes in both models, respectively, for further validation.…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, the AUC, accuracy, precision, recall, specificity, and F1-score were calculated from Confusion Matrices to evaluate the classification capability of each model. 26 Finally, the two models with the highest average AUC in validation sets were chosen without affecting the accuracy of classification efficiency. We selected the random forest and the XGBoost models and mapped the most important top 20 genes in both models, respectively, for further validation.…”
Section: Methodsmentioning
confidence: 99%
“…96.7. The authors [18] have presented a new method based on ML for detecting Mirai malware "NBaIoT" dataset, which data consist of features infected by the Mirai Malware, is used in that study. The Cross-Validation technique has been used for data splitting to overcome overfitting, and the experiment was conducted using ANN.…”
Section: Related Workmentioning
confidence: 99%
“…The technological advancements in present-day cyberattacks has made the activities of advanced attackers more complex to detect as a result of emerging obfuscation techniques [27], [38], [39] and interactions [40] with stealth variations carried out on IoT ecosystems.…”
Section: The Need To Convert Iot Malware Binaries To Imagesmentioning
confidence: 99%
“…In modern times, the emerging polymorphic malware attacks in the IoT ecosystems have been a major concern [1] due to complex obfuscation code structures that are mostly time based [41], [42]. These IoT malware signatures attacks that are predominantly multivariate [39], [40], [42]- [44] are updated sequentially on a minute-by-minute or hour-by-hour basis et al by the attackers, thereby inundating and silencing any potential alert system, which may cause massive vulnerabilities for exploitations in an IoT ecosystem. The current widespread detection and mitigation mechanisms for these emerging polymorphic IoT malware attacks that are largely obfuscated intricately can be problematic and resource intensive to both the traditional and automated malware detection solutions such as the signature based (e.g., large database), and automated based techniques (insufficient information) etc., adopted by major cybersecurity vendors, practitioners, and researchers in the cross-discipline cybersecurity industries.…”
Section: The Need To Convert Iot Malware Binaries To Imagesmentioning
confidence: 99%
See 1 more Smart Citation