2021 IEEE World AI IoT Congress (AIIoT) 2021
DOI: 10.1109/aiiot52608.2021.9454215
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Mirai Malware Detection in IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…Not all malware types are covered in this research. A novel approach [21] ANN based on a machine learning algorithm is used to detect Mirai and Benign in IoT devices. The Mirai and Benign datasets are used in Matlab2018b implementation and training.…”
Section: Background Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Not all malware types are covered in this research. A novel approach [21] ANN based on a machine learning algorithm is used to detect Mirai and Benign in IoT devices. The Mirai and Benign datasets are used in Matlab2018b implementation and training.…”
Section: Background Studymentioning
confidence: 99%
“…In the fourth quarter of the year 2016, the Mirai [21] (IoT Botnet) malware attack has infected around 80 thousands to 2.5 million Internet-connected devices (computers) via a DDoS attack. Due to the widespread use of search engines, DDoS hackers may easily locate the new IoT devices more quickly over the Internet [10].…”
Section: Background Studymentioning
confidence: 99%
“…Then they applied three classification algorithms to the traffic sessions rather than individual packets because per-packet classification is computationally much more costly and does not yield any significant benefits. Palla et al [ 46 ] detected Mirai viruses in IoT devices using neural networks to highlight packets in network traffic. Their scheme used Artificial Neural Networks (ANN) to compute the accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, we compare the performance of MDABP against the existing malware classification methods. Since existing dynamic cross-architecture analysis methods that use a single set of system calls as features are not available, we compare MDABP with dynamic analysis methods based on the characteristics of network traffic [ 45 , 46 , 47 ]. Specifically, Kumar et al [ 45 ] proposed a distributed modularization scheme based on a network traffic database that involves three machine learning models as classification models.…”
Section: Experimental Evaluationmentioning
confidence: 99%
See 1 more Smart Citation