Affiliation:
1. Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah 21959, Saudi Arabia
2. Department of Creative Technologies, Air University Islamabad, Islamabad 44000, Pakistan
Abstract
The Internet of Things (IoT) constitutes the foundation of a deeply interconnected society in which objects communicate through the Internet. This innovation, coupled with 5G and artificial intelligence (AI), finds application in diverse sectors like smart cities and advanced manufacturing. With increasing IoT adoption comes heightened vulnerabilities, prompting research into identifying IoT malware. While existing models excel at spotting known malicious code, detecting new and modified malware presents challenges. This paper presents a novel six-step framework. It begins with eight malware attack datasets as input, followed by insights from Exploratory Data Analysis (EDA). Feature engineering includes scaling, One-Hot Encoding, target variable analysis, feature importance using MDI and XGBoost, and clustering with K-Means and PCA. Our GhostNet ensemble, combined with the Gated Recurrent Unit Ensembler (GNGRUE), is trained on these datasets and fine-tuned using the Jaya Algorithm (JA) to identify and categorize malware. The tuned GNGRUE-JA is tested on malware datasets. A comprehensive comparison with existing models encompasses performance, evaluation criteria, time complexity, and statistical analysis. Our proposed model demonstrates superior performance through extensive simulations, outperforming existing methods by around 15% across metrics like AUC, accuracy, recall, and hamming loss, with a 10% reduction in time complexity. These results emphasize the significance of our study’s outcomes, particularly in achieving cost-effective solutions for detecting eight malware strains.
Funder
Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia
Subject
Information Systems and Management,Computer Networks and Communications,Modeling and Simulation,Control and Systems Engineering,Software
Reference51 articles.
1. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review;Mishra;IEEE Access,2021
2. A Comprehensive Survey on Machine Learning Approaches for Malware Detection in IoT-Based Enterprise Information System;Gaurav;Enterp. Inf. Syst.,2023
3. A Survey on Deep Learning for Cybersecurity: Progress, Challenges, and Opportunities;Macas;Comput. Netw.,2022
4. Customization of On-Site Assembly Services by Integrating the Internet of Things and BIM Technologies in Modular Integrated Construction;Zhou;Autom. Constr.,2021
5. A Novel Deep Learning-Based Approach for Malware Detection;Shaukat;Eng. Appl. Artif. Intell.,2023
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献