Malware Clustering System using Moth-Flame Optimization as IoT Security Strengthening

Ronald Adrian, Tasya Widiasari, M. A. R. Somardani, Ahmad Jayadi Okke
{"title":"Malware Clustering System using Moth-Flame Optimization as IoT Security Strengthening","authors":"Ronald Adrian, Tasya Widiasari, M. A. R. Somardani, Ahmad Jayadi Okke","doi":"10.1109/ICCoSITE57641.2023.10127768","DOIUrl":null,"url":null,"abstract":"IoT has become a magnet in today’s cyber world. In the past, household devices were still operated manually, but now they can connect to the internet. The advantage is that house residents can easily monitor and control their devices. With so many IoT devices, it will be more attractive for hackers to take them. There are lots of valuable assets on IoT devices that must be secured. One of them is data from these IoT devices. IoT hardware limitations are the main problem when carrying out a comprehensive data security process. The high computational load to perform this task cannot be adequately accommodated by IoT devices. Through this paper, we propose a clustering system based on the moth flame optimization algorithm to ease the performance of IoT hardware in securing each data. This method is efficient enough to reduce the computational load handled by the RAM and IoT processor. It is open to further improvement to get an end-to-end IoT security system and low computing load.","PeriodicalId":256184,"journal":{"name":"2023 International Conference on Computer Science, Information Technology and Engineering (ICCoSITE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Science, Information Technology and Engineering (ICCoSITE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCoSITE57641.2023.10127768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

IoT has become a magnet in today’s cyber world. In the past, household devices were still operated manually, but now they can connect to the internet. The advantage is that house residents can easily monitor and control their devices. With so many IoT devices, it will be more attractive for hackers to take them. There are lots of valuable assets on IoT devices that must be secured. One of them is data from these IoT devices. IoT hardware limitations are the main problem when carrying out a comprehensive data security process. The high computational load to perform this task cannot be adequately accommodated by IoT devices. Through this paper, we propose a clustering system based on the moth flame optimization algorithm to ease the performance of IoT hardware in securing each data. This method is efficient enough to reduce the computational load handled by the RAM and IoT processor. It is open to further improvement to get an end-to-end IoT security system and low computing load.
利用蛾焰优化增强物联网安全的恶意软件集群系统
物联网已经成为当今网络世界的一块磁铁。过去,家用设备仍然是手动操作的,但现在它们可以连接到互联网。这样做的好处是,住户可以很容易地监控和控制他们的设备。有了这么多的物联网设备,黑客将更有吸引力地拿走它们。物联网设备上有许多有价值的资产必须得到保护。其中之一是来自这些物联网设备的数据。在执行全面的数据安全流程时,物联网硬件限制是主要问题。物联网设备无法充分适应执行此任务的高计算负载。通过本文,我们提出了一种基于蛾焰优化算法的集群系统,以减轻物联网硬件在保护每个数据方面的性能。这种方法足够有效,可以减少RAM和物联网处理器处理的计算负载。它可以进一步改进,以获得端到端物联网安全系统和低计算负载。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信