Affiliation:
1. Institute for Information Industry
2. National Institute of Information and Communications Technology
3. National Taiwan University
Abstract
Threats to devices that are part of the Internet of Things (IoT) are on the rise. Owing to the overwhelming diversity of IoT hardware and software, as well as its variants, conventional anti-virus techniques based on the Windows paradigm cannot be applied directly to counter threats to the IoT devices. In this article, we propose a framework that can efficiently analyze IoT malware in a wide range of environments. It consists of a universal feature representation obtained by static analysis of the malware and a machine learning scheme that first detects the malware and then classifies it into a known category. The framework was evaluated by applying it to a recently developed dataset consisting of more than 6,000 IoT malware samples collected from the HoneyPot project. The results show that the proposed method can obtain near-optimal accuracy in terms of the detection and classification of malware targeting IoT devices.
Publisher
Association for Computing Machinery (ACM)
Reference54 articles.
1. Yokohama National University. (n.d.). Home Page. Retrieved January 31 2020 from http://www.ynu.ac.jp/. Yokohama National University. (n.d.). Home Page. Retrieved January 31 2020 from http://www.ynu.ac.jp/.
2. CZ.NIC. (n.d.). Home Page. Retrieved January 31 2020 from https://www.nic.cz/. CZ.NIC. (n.d.). Home Page. Retrieved January 31 2020 from https://www.nic.cz/.
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献