skip to main content
10.1145/3640771.3640785acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiscaiConference Proceedingsconference-collections
research-article

Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoT

Published:29 March 2024Publication History

ABSTRACT

Abstract. Smart Cities, the modern digital urban landscapes, are primarily facilitated by the Internet of Things (IoT) infrastructures for information communication. Despite Smart Cities' benefits, risks revolving around data privacy and security within the IoT sphere raise concern. Particularly, malware attacks significantly threaten IoT systems, demanding proactive research into malware prevention techniques. This paper presents a study on autoencoder (AE)-based methodologies for efficient imagery analysis-based malware classification, aiming to enhance the Smart Cities IoT security. It focuses on effective malware classification utilizing various AE structures applied to grayscale or RGB malware derived images, contributing to improved malware detection and analysis. We conduct experiments with different input shapes and multi-label classification output to ascertain the robustness and generalizability of the proposed method. By analysing the classification capabilities of different AE types, we prove that variational AE built with convolutional neural network can achieve effective malware imagery classification in Smart City IoT environments.

References

  1. Javier Carrillo-Mondejar, (2020) Automatic Analysis Architecture of IoT Malware Samples. Security and Communication Networks. 10.Google ScholarGoogle Scholar
  2. Byungho Jung, (2018) Malware Classification Using Byte Sequence Information. Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems. 18: 143–148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jueun Jeon, (2020) Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model. IEEE Access. 8: 96899-96911.Google ScholarGoogle ScholarCross RefCross Ref
  4. Gueltoum Bendiab, (2020) IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. 6th IEEE Conference on Network Softwarization (NetSoft): 444-449.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ahmed Abusnaina, (2022) DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. IEEE Transactions on Dependable and Secure Computing. 19(5): 3432-3447.Google ScholarGoogle ScholarCross RefCross Ref
  6. Khanh Duy Tung Nguyen, (2018) Comparison of Three Deep Learning-based Approaches for IoT Malware Detection.10th International Conference on Knowledge and Systems Engineering (KSE): 382-388.Google ScholarGoogle Scholar
  7. Hamed Haddad Pajouh, (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Generation Computer Systems. 85: 88-96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jiawei Su, (2018) Lightweight Classification of IoT Malware Based on Image Recognition. 2018 IEEE 42nd Annual Computer Software and Applications Conference. 2: 664-669.Google ScholarGoogle ScholarCross RefCross Ref
  9. Ensieh Modiri Dovom, (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. Journal of Systems Architecture. 97: 1-7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Weizhong Qiang, (2022) Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks. Computers & Security. 122: 102871.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zonghua Zhang, (2018) Detecting Malware with an Ensemble Method Based on Deep Neural Network. Security and Communication Networks.Google ScholarGoogle Scholar
  12. Mohammed K. Alzaylaee, (2020) DL-Droid: Deep learning based android malware detection using real devices. Computers & Security. 89: 101663.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Muhammad Ijaz, (2019) Static and Dynamic Malware Analysis Using Machine Learning. 16th International Bhurban Conference on Applied Sciences and Technology. 687-691.Google ScholarGoogle ScholarCross RefCross Ref
  14. Hamid Darabian, (2020) Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. J Grid Computing. 18: 293–303.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lucas Pinheiro Cinelli, (2021). Variational Autoencoder. Variational Methods for Machine Learning with Applications to Deep Networks. 111–149.Google ScholarGoogle ScholarCross RefCross Ref
  16. Karen Simonyan, (2017) Very Deep Convolutional Networks for Large-Scale Image Recognition. International Conference on Learning Representations.Google ScholarGoogle Scholar
  17. Francois Chollet(2017) Xception: Deep Learning With Depthwise Separable Convolutions.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ISCAI '23: Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence
    October 2023
    120 pages
    ISBN:9798400708954
    DOI:10.1145/3640771

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 March 2024

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)11

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format