Malware Detection for Internet of Things Using One-Class Classification

Author:

Shi Tongxin1ORCID,McCann Roy A.2,Huang Ying3,Wang Wei1,Kong Jun1ORCID

Affiliation:

1. Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA

2. Department of Electrical Engineering, University of Arkansas, Fayetteville, AR 72701, USA

3. Department of Civil, Construction and Environmental Engineering, North Dakota State University, Fargo, ND 58102, USA

Abstract

The increasing usage of interconnected devices within the Internet of Things (IoT) and Industrial IoT (IIoT) has significantly enhanced efficiency and utility in both personal and industrial settings but also heightened cybersecurity vulnerabilities, particularly through IoT malware. This paper explores the use of one-class classification, a method of unsupervised learning, which is especially suitable for unlabeled data, dynamic environments, and malware detection, which is a form of anomaly detection. We introduce the TF-IDF method for transforming nominal features into numerical formats that avoid information loss and manage dimensionality effectively, which is crucial for enhancing pattern recognition when combined with n-grams. Furthermore, we compare the performance of multi-class vs. one-class classification models, including Isolation Forest and deep autoencoder, that are trained with both benign and malicious NetFlow samples vs. trained exclusively on benign NetFlow samples. We achieve 100% recall with precision rates above 80% and 90% across various test datasets using one-class classification. These models show the adaptability of unsupervised learning, especially one-class classification, to the evolving malware threats in the IoT domain, offering insights into enhancing IoT security frameworks and suggesting directions for future research in this critical area.

Funder

National Science Foundation

Publisher

MDPI AG

Reference19 articles.

1. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices;Meneghello;IEEE Internet Things J.,2019

2. Cyber security challenges for IoT-based smart grid networks;Kimani;Int. J. Crit. Infrastruct. Prot.,2019

3. (2024, June 07). Smart Meter Hacks Cost Hundreds of Millions Annually, FBI Says. NBCNews.com. Available online: https://www.nbcnews.com/id/wbna47003851.

4. (2024, June 07). Sandworm Disrupts Power in Ukraine Using a Novel Attack against Operational Technology, Google. Available online: https://cloud.google.com/blog/topics/threat-intelligence/sandworm-disrupts-power-ukraine-operational-technology.

5. Intelligent OS X malware threat detection with code inspection;Pajouh;J. Comput. Virol. Hacking Tech.,2018

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3