Optimized and Efficient Image-Based IoT Malware Detection Method
-
Published:2023-01-31
Issue:3
Volume:12
Page:708
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
El-Ghamry Amir123, Gaber Tarek45ORCID, Mohammed Kamel K.6ORCID, Hassanien Aboul Ella7ORCID
Affiliation:
1. Faculty of Computers and Information, Mansoura University, Mansoura 35516, Egypt 2. School of Engineering and Computer Science, University of Hertfordshire Hosted by Global Academic Foundation, Cairo 16192, Egypt 3. Faculty of Computer Science and Engineering, New Mansoura University, Mansoura 35516, Egypt 4. School of Science, Engineering, and Environment, University of Salford, Salford M5 4WT, UK 5. Faculty of Computers and Informatics, Suez Canal University, Ismailia 41522, Egypt 6. Center for Virus Research and Studies, Al-Azhar University, Cairo 11754, Egypt 7. Faculty of Computer and Artificial Intelligence, Cairo University, Giza 13062, Egypt
Abstract
With the widespread use of IoT applications, malware has become a difficult and sophisticated threat. Without robust security measures, a massive volume of confidential and classified data could be exposed to vulnerabilities through which hackers could do various illicit acts. As a result, improved network security mechanisms that can analyse network traffic and detect malicious traffic in real-time are required. In this paper, a novel optimized machine learning image-based IoT malware detection method is proposed using visual representation (i.e., images) of the network traffic. In this method, the ant colony optimizer (ACO)-based feature selection method was proposed to get a minimum number of features while improving the support vector machines (SVMs) classifier’s results (i.e., the malware detection results). Further, the PSO algorithm tuned the SVM parameters of the different kernel functions. Using a public dataset, the experimental results showed that the SVM linear function kernel is the best with an accuracy of 95.56%, recall of 96.43%, precision of 94.12%, and F1_score of 95.26%. Comparing with the literature, it was concluded that bio-inspired techniques, i.e., ACO and PSO, could be used to build an effective and lightweight machine-learning-based malware detection system for the IoT environment.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference59 articles.
1. Nobakht, M., Sivaraman, V., and Boreli, R. (September, January 31). A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using Openflow. Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria. 2. Statista Research Department (2019, November 25). Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (In Billions). Available online: https://bit.ly/2DhYEL0. 3. Phishing email detection using natural language processing techniques: A literature survey;Salloum;Procedia Comput. Sci.,2021 4. Avast (2019, November 25). Avast Smart Home Security Report 2019. Available online: https://bit.ly/2pOSf70. 5. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., and Kallitsis, M. (2017, January 16–18). Understanding the Mirai Botnet. Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canda.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Intrusion Outlier Neutralizer;Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology;2024-04-12 2. Decision Trees Unleashed;Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology;2024-04-12 3. Advancing IoT Security Posture K-Means Clustering for Malware Detection;Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology;2024-04-12 4. Automated Malware Detection Based on a Machine Learning Algorithm;2023 IEEE Tenth International Conference on Communications and Networking (ComNet);2023-11-01 5. Image-Based Malware Classification: A Systematic Literature Review;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22
|
|