Affiliation:
1. School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK
Abstract
With the expansion of the digital world, the number of Internet of things (IoT) devices is evolving dramatically. IoT devices have limited computational power and a small memory. Consequently, existing and complex security methods are not suitable to detect unknown malware attacks in IoT networks. This has become a major concern in the advent of increasingly unpredictable and innovative cyberattacks. In this context, artificial immune systems (AISs) have emerged as an effective malware detection mechanism with low requirements for computation and memory. In this research, we first validate the malware detection results of a recent AIS solution using multiple datasets with different types of malware attacks. Next, we examine the potential gains and limitations of promising AIS solutions under realistic implementation scenarios. We design a realistic IoT framework mimicking real-life IoT system architectures. The objective is to evaluate the AIS solutions’ performance with regard to the system constraints. We demonstrate that AIS solutions succeed in detecting unknown malware in the most challenging conditions. Furthermore, the systemic results with different system architectures reveal the AIS solutions’ ability to transfer learning between IoT devices. Transfer learning is a pivotal feature in the presence of highly constrained devices in the network. More importantly, this work highlights that previously published AIS performance results, which were obtained in a simulation environment, cannot be taken at face value. In reality, AIS’s malware detection accuracy for IoT systems is 91% in the most restricted designed system compared to the 99% accuracy rate reported in the simulation experiment.
Subject
Critical Care Nursing,Pediatrics
Reference36 articles.
1. The evolution of the Internet of Things IoT over the past 20 years;Wang;Comput. Ind. Eng.,2021
2. Investigation the structure of the Internet of things (IoT) patent network using social network analysis;Mazlumi;IEEE Internet Things J.,2022
3. Alrubayyi, H., Goteng, G., Jaber, M., and Kelly, J. (2021). Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches. J. Sens. Actuator Netw., 10.
4. (2023, June 01). The Most Vulnerable IOT Devices: Think before You Buy. Available online: https://tdwi.org/articles/2021/11/05/most-vulnerable-iot-devices.aspx.
5. Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms;Asif;IoT,2021
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献