Build a malware detection software for IOT network Using Machine learning

Somaya Haiba, T. Mazri
{"title":"Build a malware detection software for IOT network Using Machine learning","authors":"Somaya Haiba, T. Mazri","doi":"10.1145/3454127.3458773","DOIUrl":null,"url":null,"abstract":"Any system based on IOT devices must provide a reliable and secure network to transmit and manipulate the data from the smallest technologies to the final server. They are the devices of nowadays, and our future for sure, it will convert all domains of our live starting from the smart home, industry, to e-healthcare systems. To achieve the quality of performances we should have an assurance of security and trustworthiness beginning by the small device used to capture information to the final terminal of the network system, using all the exist possibilities that we can implement to ensure a secure employment. Until now, machine learning become the most powerful application, which provides for any systems the capacity of auto-learning, and improving itself taking a help from the old experiences and without any human intervention or being explicit programmed. Furthermore, the usage of IOT networks, as we know is growing and evaluate enormously so the menaces keep up to date exploiting the weakness of these tools. For that, we propose to make a look about, What machine learning is coming with, to perform more security and analyses the threats, and how can it be used to detect any endanger before it can gain control. Knowing that the reproducible use of resource-constrained IOT devices, the number of IOT Malwares has exploded variously with many ways of breakthrough and then the requirement, to have an efficient malware detection adequate with this grown-up is on immense increasing importance. In this paper, we discuss the usability of machine learning applications in malwares detection software for IOT networks to elicitation the standards, which can us, use to build a powerful model to improve the network security of this small technologies answering to pervious questions.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3454127.3458773","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Any system based on IOT devices must provide a reliable and secure network to transmit and manipulate the data from the smallest technologies to the final server. They are the devices of nowadays, and our future for sure, it will convert all domains of our live starting from the smart home, industry, to e-healthcare systems. To achieve the quality of performances we should have an assurance of security and trustworthiness beginning by the small device used to capture information to the final terminal of the network system, using all the exist possibilities that we can implement to ensure a secure employment. Until now, machine learning become the most powerful application, which provides for any systems the capacity of auto-learning, and improving itself taking a help from the old experiences and without any human intervention or being explicit programmed. Furthermore, the usage of IOT networks, as we know is growing and evaluate enormously so the menaces keep up to date exploiting the weakness of these tools. For that, we propose to make a look about, What machine learning is coming with, to perform more security and analyses the threats, and how can it be used to detect any endanger before it can gain control. Knowing that the reproducible use of resource-constrained IOT devices, the number of IOT Malwares has exploded variously with many ways of breakthrough and then the requirement, to have an efficient malware detection adequate with this grown-up is on immense increasing importance. In this paper, we discuss the usability of machine learning applications in malwares detection software for IOT networks to elicitation the standards, which can us, use to build a powerful model to improve the network security of this small technologies answering to pervious questions.
利用机器学习为物联网网络构建恶意软件检测软件
任何基于物联网设备的系统都必须提供可靠和安全的网络,以传输和操作从最小技术到最终服务器的数据。它们是当今的设备,当然也是我们的未来,它将改变我们生活的所有领域,从智能家居、工业到电子医疗系统。为了实现高质量的性能,我们应该有一个安全可靠的保证,从用于捕获信息的小型设备到网络系统的最终终端,利用我们所能实现的所有现有可能性来确保安全使用。到目前为止,机器学习成为最强大的应用程序,它为任何系统提供了自动学习的能力,并在没有任何人为干预或明确编程的情况下,从旧的经验中获得帮助,并自我改进。此外,正如我们所知,物联网网络的使用正在增长和评估,因此威胁不断更新,利用这些工具的弱点。为此,我们建议研究一下机器学习将带来什么,以执行更多的安全性并分析威胁,以及如何在它获得控制之前使用它来检测任何危害。知道资源受限的物联网设备的可重复使用,物联网恶意软件的数量已经随着许多突破方式的爆炸式增长,然后要求有一个有效的恶意软件检测与这个成年人是非常重要的。在本文中,我们讨论了机器学习应用在物联网网络恶意检测软件中的可用性,以引出标准,我们可以使用这些标准来构建一个强大的模型,以提高这种小技术的网络安全性,回答前面的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信