Abstract
The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security integration. This demands augmenting the things with state-of-the-art deep learning models for enhanced detection and protection of the user data. Existingly, the deep learning solutions are overly complex, and often overfitted for the given problem. In this research, our primary objective is to investigate a lightweight deep-learning approach maximizes the accuracy scores with lower computational costs to ensure the applicability of real-time malware monitoring in constrained IoT devices. We used state-of-the-art Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), and Bi-directional LSTM deep learning algorithm on a vanilla configuration trained on a standard malware dataset. The results of the proposed approach show that the simple deep neural models having single dense layer and a few hundred trainable parameters can eliminate the model overfitting and achieve up to 99.45% accuracy, outperforming the overly complex deep learning models.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference56 articles.
1. Internet of things: A survey on enabling technologies, protocols, and applications;Guizani;IEEE Commun. Surv. Tutor.,2015
2. A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks;Naveed;Wireless Commun. Mob. Comput.,2022
3. A survey: DDOS attack on Internet of Things;Sonar;Int. J. Eng. Res. Dev.,2014
4. Zohora, F.T., Khan, M.R.R., Bhuiyan, M.F.R., and Das, A.K. (2017, January 22–23). Enhancing the capabilities of IoT based fog and cloud infrastructures for time sensitive events. Proceedings of the 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), Palembang, Indonesia.
5. Naveed, M., Usman, S.M., Satti, M.I., Aleshaiker, S., and Anwar, A. (2022, January 26–29). Intrusion Detection in Smart IoT Devices for People with Disabilities. Proceedings of the 2022 IEEE International Smart Cities Conference (ISC2), Paphos, Cyprus.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献