Ronald Adrian, Tasya Widiasari, M. A. R. Somardani, Ahmad Jayadi Okke
{"title":"Malware Clustering System using Moth-Flame Optimization as IoT Security Strengthening","authors":"Ronald Adrian, Tasya Widiasari, M. A. R. Somardani, Ahmad Jayadi Okke","doi":"10.1109/ICCoSITE57641.2023.10127768","DOIUrl":null,"url":null,"abstract":"IoT has become a magnet in today’s cyber world. In the past, household devices were still operated manually, but now they can connect to the internet. The advantage is that house residents can easily monitor and control their devices. With so many IoT devices, it will be more attractive for hackers to take them. There are lots of valuable assets on IoT devices that must be secured. One of them is data from these IoT devices. IoT hardware limitations are the main problem when carrying out a comprehensive data security process. The high computational load to perform this task cannot be adequately accommodated by IoT devices. Through this paper, we propose a clustering system based on the moth flame optimization algorithm to ease the performance of IoT hardware in securing each data. This method is efficient enough to reduce the computational load handled by the RAM and IoT processor. It is open to further improvement to get an end-to-end IoT security system and low computing load.","PeriodicalId":256184,"journal":{"name":"2023 International Conference on Computer Science, Information Technology and Engineering (ICCoSITE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Science, Information Technology and Engineering (ICCoSITE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCoSITE57641.2023.10127768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
IoT has become a magnet in today’s cyber world. In the past, household devices were still operated manually, but now they can connect to the internet. The advantage is that house residents can easily monitor and control their devices. With so many IoT devices, it will be more attractive for hackers to take them. There are lots of valuable assets on IoT devices that must be secured. One of them is data from these IoT devices. IoT hardware limitations are the main problem when carrying out a comprehensive data security process. The high computational load to perform this task cannot be adequately accommodated by IoT devices. Through this paper, we propose a clustering system based on the moth flame optimization algorithm to ease the performance of IoT hardware in securing each data. This method is efficient enough to reduce the computational load handled by the RAM and IoT processor. It is open to further improvement to get an end-to-end IoT security system and low computing load.