2022
DOI: 10.1038/s41598-022-18936-9
|View full text |Cite
|
Sign up to set email alerts
|

IoT malware detection architecture using a novel channel boosted and squeezed CNN

Abstract: Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of smart devices to constitute a network introduces many security challenges. These connected devices have created a security blind spot, where cybercriminals can easily launch attacks to compromise the devices using malware proliferation techniques. Therefore, malware detection is a lifeline for securing IoT devices against cyberattacks. This study addresses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 47 publications
(24 citation statements)
references
References 34 publications
0
18
0
Order By: Relevance
“…The scores in most of the models are higher than 99%, which indicates that the models employing our proposed features perform quite well. The results of the proposed method were compared with similar studies, such as opcode feature [25], 2D image of executable file [51], behavior-based feature [23], CFG feature [52], etc. We selected to use a MLP model as the comparison models employed a Convolutional Neural Network (CNN) as the deep learning algorithm.…”
Section: B Malware Detectionmentioning
confidence: 99%
“…The scores in most of the models are higher than 99%, which indicates that the models employing our proposed features perform quite well. The results of the proposed method were compared with similar studies, such as opcode feature [25], 2D image of executable file [51], behavior-based feature [23], CFG feature [52], etc. We selected to use a MLP model as the comparison models employed a Convolutional Neural Network (CNN) as the deep learning algorithm.…”
Section: B Malware Detectionmentioning
confidence: 99%
“…The term "malicious activities" in this context refers to nine common forms of malicious assaults that might affect any Internet of Things device. We track network tra c and produce malware instance reports that include evasion, information collecting, needed privilege, required privilege, library, persistence method, required privilege, and process interaction [12].…”
Section: Data Pre-processingmentioning
confidence: 99%
“…Asam et al [ 62 ] designed a CNN-based malware detection architecture in IoT called iMDA. Edge exploration and smoothing, multi-path expanded convolutional operations, and channel compressing and boosting in CNN were just a few of the feature learning schemes that were included in the proposed iMDA’s modular design and were used to learn a variety of features.…”
Section: Introductionmentioning
confidence: 99%