Transfer Learning for Image-Based Malware Detection for IoT

Author:

Panda Pratyush1ORCID,C U Om Kumar1ORCID,Marappan Suguna1ORCID,Ma Suresh2ORCID,S Manimurugan3ORCID,Veesani Nandi Deeksha4

Affiliation:

1. School of Computer Science and Engineering, Vellore Institute of Technology, Chennai 600127, India

2. Amrita School of Business, Amrita Vishwa Vidyapeetham, Coimbatore 641112, India

3. Faculty of Computers and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia

4. Technical Lead, Virtusa Consulting Services, Chennai 603103, India

Abstract

The tremendous growth in online activity and the Internet of Things (IoT) led to an increase in cyberattacks. Malware infiltrated at least one device in almost every household. Various malware detection methods that use shallow or deep IoT techniques were discovered in recent years. Deep learning models with a visualization method are the most commonly and popularly used strategy in most works. This method has the benefit of automatically extracting features, requiring less technical expertise, and using fewer resources during data processing. Training deep learning models that generalize effectively without overfitting is not feasible or appropriate with large datasets and complex architectures. In this paper, a novel ensemble model, Stacked Ensemble—autoencoder, GRU, and MLP or SE-AGM, composed of three light-weight neural network models—autoencoder, GRU, and MLP—that is trained on the 25 essential and encoded extracted features of the benchmark MalImg dataset for classification was proposed. The GRU model was tested for its suitability in malware detection due to its lesser usage in this domain. The proposed model used a concise set of malware features for training and classifying the malware classes, which reduced the time and resource consumption in comparison to other existing models. The novelty lies in the stacked ensemble method where the output of one intermediate model works as input for the next model, thereby refining the features as compared to the general notion of an ensemble approach. Inspiration was drawn from earlier image-based malware detection works and transfer learning ideas. To extract features from the MalImg dataset, a CNN-based transfer learning model that was trained from scratch on domain data was used. Data augmentation was an important step in the image processing stage to investigate its effect on classifying grayscale malware images in the MalImg dataset. SE-AGM outperformed existing approaches on the benchmark MalImg dataset with an average accuracy of 99.43%, demonstrating that our method was on par with or even surpassed them.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference75 articles.

1. Wikipedia (2022, December 06). Computer Security. Available online: https://en.wikipedia.org/wiki/Computer_security.

2. SpringerLink (2023, February 23). Fuzzy Mathematics: An Introduction for Engineers and Scientists. Available online: https://link.springer.com/book/10.1007/978-3-7908-1808-6.

3. Debnath, P., and Mohiuddine, S.A. (2021). Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences, CRC Press. [1st ed.].

4. Kumar, C.O., Tejaswi, K., and Bhargavi, P. (2013, January 21–22). A distributed cloud-prevents attacks and preserves user privacy. Proceedings of the 2013 15th International Conference on Advanced Computing Technologies (ICACT), Rajampet, India.

5. Detecting and confronting flash attacks from IoT botnets;J. Supercomput.,2019

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Distributed Image Classification on Big Data Platforms: A Gradient Boosted Trees Approach;2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE);2024-05-09

2. Radon transform based malware classification in cyber-physical system using deep learning;Results in Control and Optimization;2024-03

3. Enhanced Image-Based Malware Multiclass Classification Method with the Ensemble Model and SVM;Open Information Science;2024-01-01

4. ZSL-SLCNN: Zero-Shot Learning with Semantic Label CNN for Malware Classification;2023 12th International Conference on Control, Automation and Information Sciences (ICCAIS);2023-11-27

5. Image-Based Malware Classification: A Systematic Literature Review;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3