Malware Detection in Internet of Things Devices Based on Association Models

Ngo Quoc-Dung
{"title":"Malware Detection in Internet of Things Devices Based on Association Models","authors":"Ngo Quoc-Dung","doi":"10.1145/3603781.3603913","DOIUrl":null,"url":null,"abstract":"In recent years, attackers have shifted aggressively targeting Internet of Things devices. In this paper, we propose the association IoT malware detection model. Before being associated, the model goes through two processing phases, each having two types of static and dynamic features. The process consists of 3 main steps: (1) the files are extracted static feature (grayscale image) and dynamic feature (system call through V-Sandbox sandbox), (2) features are preprocessed and fed into the learning models; for the grayscale image feature, a convolutional neural network (CNN) is used; for the system call graph feature, traditional machine learning algorithms are used; (3) the results from the two learning models are combined by late fusion to decide the final prediction label for the input files. The performance of the proposed method was evaluated, and its detection accuracy was 99.14% better than in the static analysis and dynamic analysis, which had 99.06% and 98.08% detection accuracy, respectively.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3603781.3603913","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In recent years, attackers have shifted aggressively targeting Internet of Things devices. In this paper, we propose the association IoT malware detection model. Before being associated, the model goes through two processing phases, each having two types of static and dynamic features. The process consists of 3 main steps: (1) the files are extracted static feature (grayscale image) and dynamic feature (system call through V-Sandbox sandbox), (2) features are preprocessed and fed into the learning models; for the grayscale image feature, a convolutional neural network (CNN) is used; for the system call graph feature, traditional machine learning algorithms are used; (3) the results from the two learning models are combined by late fusion to decide the final prediction label for the input files. The performance of the proposed method was evaluated, and its detection accuracy was 99.14% better than in the static analysis and dynamic analysis, which had 99.06% and 98.08% detection accuracy, respectively.
基于关联模型的物联网设备恶意软件检测
近年来,攻击者开始积极瞄准物联网设备。本文提出了关联物联网恶意软件检测模型。在关联之前,模型要经历两个处理阶段,每个阶段都有两种类型的静态和动态特征。该过程包括3个主要步骤:(1)提取文件的静态特征(灰度图像)和动态特征(通过V-Sandbox沙箱进行系统调用);(2)对特征进行预处理并输入到学习模型中;对于灰度图像特征,使用卷积神经网络(CNN);对于系统调用图特征,采用传统的机器学习算法;(3)对两个学习模型的结果进行后期融合,确定输入文件的最终预测标签。对该方法的性能进行了评价,其检测准确率比静态分析和动态分析的检测准确率分别提高了99.06%和98.08%,提高了99.14%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信