Optimized and Efficient Image-Based IoT Malware Detection Method

Author:

El-Ghamry Amir123,Gaber Tarek45ORCID,Mohammed Kamel K.6ORCID,Hassanien Aboul Ella7ORCID

Affiliation:

1. Faculty of Computers and Information, Mansoura University, Mansoura 35516, Egypt

2. School of Engineering and Computer Science, University of Hertfordshire Hosted by Global Academic Foundation, Cairo 16192, Egypt

3. Faculty of Computer Science and Engineering, New Mansoura University, Mansoura 35516, Egypt

4. School of Science, Engineering, and Environment, University of Salford, Salford M5 4WT, UK

5. Faculty of Computers and Informatics, Suez Canal University, Ismailia 41522, Egypt

6. Center for Virus Research and Studies, Al-Azhar University, Cairo 11754, Egypt

7. Faculty of Computer and Artificial Intelligence, Cairo University, Giza 13062, Egypt

Abstract

With the widespread use of IoT applications, malware has become a difficult and sophisticated threat. Without robust security measures, a massive volume of confidential and classified data could be exposed to vulnerabilities through which hackers could do various illicit acts. As a result, improved network security mechanisms that can analyse network traffic and detect malicious traffic in real-time are required. In this paper, a novel optimized machine learning image-based IoT malware detection method is proposed using visual representation (i.e., images) of the network traffic. In this method, the ant colony optimizer (ACO)-based feature selection method was proposed to get a minimum number of features while improving the support vector machines (SVMs) classifier’s results (i.e., the malware detection results). Further, the PSO algorithm tuned the SVM parameters of the different kernel functions. Using a public dataset, the experimental results showed that the SVM linear function kernel is the best with an accuracy of 95.56%, recall of 96.43%, precision of 94.12%, and F1_score of 95.26%. Comparing with the literature, it was concluded that bio-inspired techniques, i.e., ACO and PSO, could be used to build an effective and lightweight machine-learning-based malware detection system for the IoT environment.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference59 articles.

1. Nobakht, M., Sivaraman, V., and Boreli, R. (September, January 31). A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using Openflow. Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria.

2. Statista Research Department (2019, November 25). Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (In Billions). Available online: https://bit.ly/2DhYEL0.

3. Phishing email detection using natural language processing techniques: A literature survey;Salloum;Procedia Comput. Sci.,2021

4. Avast (2019, November 25). Avast Smart Home Security Report 2019. Available online: https://bit.ly/2pOSf70.

5. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., and Kallitsis, M. (2017, January 16–18). Understanding the Mirai Botnet. Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canda.

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Intrusion Outlier Neutralizer;Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology;2024-04-12

2. Decision Trees Unleashed;Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology;2024-04-12

3. Advancing IoT Security Posture K-Means Clustering for Malware Detection;Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology;2024-04-12

4. Automated Malware Detection Based on a Machine Learning Algorithm;2023 IEEE Tenth International Conference on Communications and Networking (ComNet);2023-11-01

5. Image-Based Malware Classification: A Systematic Literature Review;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3