ABSTRACT
Abstract. Smart Cities, the modern digital urban landscapes, are primarily facilitated by the Internet of Things (IoT) infrastructures for information communication. Despite Smart Cities' benefits, risks revolving around data privacy and security within the IoT sphere raise concern. Particularly, malware attacks significantly threaten IoT systems, demanding proactive research into malware prevention techniques. This paper presents a study on autoencoder (AE)-based methodologies for efficient imagery analysis-based malware classification, aiming to enhance the Smart Cities IoT security. It focuses on effective malware classification utilizing various AE structures applied to grayscale or RGB malware derived images, contributing to improved malware detection and analysis. We conduct experiments with different input shapes and multi-label classification output to ascertain the robustness and generalizability of the proposed method. By analysing the classification capabilities of different AE types, we prove that variational AE built with convolutional neural network can achieve effective malware imagery classification in Smart City IoT environments.
- Javier Carrillo-Mondejar, (2020) Automatic Analysis Architecture of IoT Malware Samples. Security and Communication Networks. 10.Google Scholar
- Byungho Jung, (2018) Malware Classification Using Byte Sequence Information. Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems. 18: 143–148.Google ScholarDigital Library
- Jueun Jeon, (2020) Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model. IEEE Access. 8: 96899-96911.Google ScholarCross Ref
- Gueltoum Bendiab, (2020) IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. 6th IEEE Conference on Network Softwarization (NetSoft): 444-449.Google ScholarCross Ref
- Ahmed Abusnaina, (2022) DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. IEEE Transactions on Dependable and Secure Computing. 19(5): 3432-3447.Google ScholarCross Ref
- Khanh Duy Tung Nguyen, (2018) Comparison of Three Deep Learning-based Approaches for IoT Malware Detection.10th International Conference on Knowledge and Systems Engineering (KSE): 382-388.Google Scholar
- Hamed Haddad Pajouh, (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Generation Computer Systems. 85: 88-96.Google ScholarDigital Library
- Jiawei Su, (2018) Lightweight Classification of IoT Malware Based on Image Recognition. 2018 IEEE 42nd Annual Computer Software and Applications Conference. 2: 664-669.Google ScholarCross Ref
- Ensieh Modiri Dovom, (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. Journal of Systems Architecture. 97: 1-7.Google ScholarDigital Library
- Weizhong Qiang, (2022) Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks. Computers & Security. 122: 102871.Google ScholarDigital Library
- Zonghua Zhang, (2018) Detecting Malware with an Ensemble Method Based on Deep Neural Network. Security and Communication Networks.Google Scholar
- Mohammed K. Alzaylaee, (2020) DL-Droid: Deep learning based android malware detection using real devices. Computers & Security. 89: 101663.Google ScholarDigital Library
- Muhammad Ijaz, (2019) Static and Dynamic Malware Analysis Using Machine Learning. 16th International Bhurban Conference on Applied Sciences and Technology. 687-691.Google ScholarCross Ref
- Hamid Darabian, (2020) Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. J Grid Computing. 18: 293–303.Google ScholarDigital Library
- Lucas Pinheiro Cinelli, (2021). Variational Autoencoder. Variational Methods for Machine Learning with Applications to Deep Networks. 111–149.Google ScholarCross Ref
- Karen Simonyan, (2017) Very Deep Convolutional Networks for Large-Scale Image Recognition. International Conference on Learning Representations.Google Scholar
- Francois Chollet(2017) Xception: Deep Learning With Depthwise Separable Convolutions.Google Scholar
Recommendations
The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems
ICEC '15: Proceedings of the 17th International Conference on Electronic Commerce 2015Nowadays a lot of botnet are being used for the purpose of cybercrime such as distributed denial of services (DDos) or information stealing. Botnet is a collection of computers connected through Internet that has been taken over by an attacker using ...
Malware Detection by Static Checking and Dynamic Analysis of Executables
The advanced malware continue to be a challenge in digital world that signature-based detection techniques fail to conquer. The malware use many anti-detection techniques to mutate. Thus no virus scanner can claim complete malware detection even for ...
Security in a smart city: challenges and solutions
SCA '19: Proceedings of the 4th International Conference on Smart City ApplicationsIn this paper we will discuss what concerns the smart city, the services in a smart city, also the mechanism of data processing and data analysis especially the data generated by the sensors because it considered a point of vulnerability in a smart city ...
Comments