A deep learning ensemble approach for malware detection in Internet of Things utilizing Explainable Artificial Intelligence

IF 7.5 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Saksham Mittal , Mohammad Wazid , Devesh Pratap Singh , Ashok Kumar Das , M. Shamim Hossain
{"title":"A deep learning ensemble approach for malware detection in Internet of Things utilizing Explainable Artificial Intelligence","authors":"Saksham Mittal ,&nbsp;Mohammad Wazid ,&nbsp;Devesh Pratap Singh ,&nbsp;Ashok Kumar Das ,&nbsp;M. Shamim Hossain","doi":"10.1016/j.engappai.2024.109560","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Things (IoT) has been popularized these days due to digitization and automation. It is deployed in various applications, i.e., smart homes, smart agriculture, smart transportation, smart healthcare, and industrial monitoring. In an IoT network, many IoT devices communicate with servers, or users access IoT devices through an open channel via a certain exchange of messages. Besides providing many benefits like efficiency, automation, and convenience, IoT presents significant security challenges due to a lack of proper standard security measures. Thus, malicious actors may be able to infect the network with malware. They may launch destructive attacks with the goal of stealing data or causing damage to the systems’ resources. This can be mitigated by introducing intrusion detection and prevention mechanisms in the network. An intelligent intrusion detection system is required to put preventative measures in place for secure communication and a malware-free network. In this article, we propose a deep learning based ensemble approach for IoT malware attack detection (in short, we call it as DLEX-IMD) trained and tested against benchmark datasets. The important measures, including accuracy, precision, recall, and F1-score, are used to evaluate the performance of the proposed DLEX-IMD. The performance of the proposed scheme is explained utilizing benchmark Explainable Artificial Intelligence (AI) method–LIME (Local Interpretable Model-Agnostic Explanations), which justifies the reliability of the proposed model training. The DLEX-IMD is also compared with a range of other closely related existing schemes and has shown better performance than those schemes with 99.96% accuracy and F1-score of 0.999.</div></div>","PeriodicalId":50523,"journal":{"name":"Engineering Applications of Artificial Intelligence","volume":"139 ","pages":"Article 109560"},"PeriodicalIF":7.5000,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering Applications of Artificial Intelligence","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0952197624017184","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) has been popularized these days due to digitization and automation. It is deployed in various applications, i.e., smart homes, smart agriculture, smart transportation, smart healthcare, and industrial monitoring. In an IoT network, many IoT devices communicate with servers, or users access IoT devices through an open channel via a certain exchange of messages. Besides providing many benefits like efficiency, automation, and convenience, IoT presents significant security challenges due to a lack of proper standard security measures. Thus, malicious actors may be able to infect the network with malware. They may launch destructive attacks with the goal of stealing data or causing damage to the systems’ resources. This can be mitigated by introducing intrusion detection and prevention mechanisms in the network. An intelligent intrusion detection system is required to put preventative measures in place for secure communication and a malware-free network. In this article, we propose a deep learning based ensemble approach for IoT malware attack detection (in short, we call it as DLEX-IMD) trained and tested against benchmark datasets. The important measures, including accuracy, precision, recall, and F1-score, are used to evaluate the performance of the proposed DLEX-IMD. The performance of the proposed scheme is explained utilizing benchmark Explainable Artificial Intelligence (AI) method–LIME (Local Interpretable Model-Agnostic Explanations), which justifies the reliability of the proposed model training. The DLEX-IMD is also compared with a range of other closely related existing schemes and has shown better performance than those schemes with 99.96% accuracy and F1-score of 0.999.
利用可解释人工智能的深度学习集合方法检测物联网中的恶意软件
由于数字化和自动化的发展,物联网(IoT)如今已得到普及。它被部署在各种应用中,如智能家居、智能农业、智能交通、智能医疗和工业监控。在物联网网络中,许多物联网设备与服务器进行通信,或者用户通过一定的信息交换,以开放的渠道访问物联网设备。除了提供效率、自动化和便利等诸多好处外,由于缺乏适当的标准安全措施,物联网还带来了巨大的安全挑战。因此,恶意行为者可能会用恶意软件感染网络。他们可能会发起破坏性攻击,目的是窃取数据或破坏系统资源。在网络中引入入侵检测和预防机制可以缓解这种情况。为了实现安全通信和无恶意软件网络,需要一个智能入侵检测系统来采取预防措施。在本文中,我们提出了一种基于深度学习的物联网恶意软件攻击检测集合方法(简而言之,我们称之为 DLEX-IMD),并根据基准数据集进行了训练和测试。我们使用准确率、精确度、召回率和 F1 分数等重要指标来评估所提出的 DLEX-IMD 的性能。利用基准可解释人工智能(AI)方法--LIME(本地可解释模型-诊断解释)解释了所提方案的性能,证明了所提模型训练的可靠性。我们还将 DLEX-IMD 与其他一系列密切相关的现有方案进行了比较,结果表明 DLEX-IMD 的准确率为 99.96%,F1 分数为 0.999,性能优于这些方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Engineering Applications of Artificial Intelligence
Engineering Applications of Artificial Intelligence 工程技术-工程:电子与电气
CiteScore
9.60
自引率
10.00%
发文量
505
审稿时长
68 days
期刊介绍: Artificial Intelligence (AI) is pivotal in driving the fourth industrial revolution, witnessing remarkable advancements across various machine learning methodologies. AI techniques have become indispensable tools for practicing engineers, enabling them to tackle previously insurmountable challenges. Engineering Applications of Artificial Intelligence serves as a global platform for the swift dissemination of research elucidating the practical application of AI methods across all engineering disciplines. Submitted papers are expected to present novel aspects of AI utilized in real-world engineering applications, validated using publicly available datasets to ensure the replicability of research outcomes. Join us in exploring the transformative potential of AI in engineering.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信