IOT-MDEDTL: IoT Malware Detection based on Ensemble Deep Transfer Learning

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 226

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_MJEE-16-3_007

تاریخ نمایه سازی: 2 آذر 1401

Abstract:

The internet of Things (IoT) is a promising expansion of the traditional Internet, which provides the foundation for millions of devices to interact with each other. IoT enables these smart devices, such as home appliances, different types of vehicles, sensor controllers, and security cameras, to share information, and this has been successfully done to enhance the quality of user experience. IoT-based mediums in day-to-day life are, in fact, minuscule computational resources, which are adjusted to be thoroughly domain-specific. As a result, monitoring and detecting various attacks on these devices becomes feasible. As the statistics prove, in the Mirai and Brickerbot botnets, Distributed Denial-of-Service (DDoS) attacks have become increasingly ubiquitous. To ameliorate this, in this paper, we propose a novel approach for detecting IoT malware from the preprocessed binary data using transfer learning. Our method comprises two feature extractors, named ResNet۱۰۱ and VGG۱۶, which learn to classify input data as malicious and non-malicious. The input data is built from preprocessing and converting the binary format of data into gray-scale images. The feature maps obtained from these two models are fused together to further be classified. Extensive experiments exhibit the efficiency of the proposed approach in a well-known dataset, achieving the accuracy, precision, and recall of ۹۶.۳۱%, ۹۵.۳۱%, and ۹۴.۸۰%, respectively.

Authors

Qasim Kadhim

English Language Department, Al-Mustaqbal University College, Babylon, Iraq

Ahmed Qassem Ali Sharhan Al-Sudani

Al-Manara College For Medical Sciences, Maysan, Iraq

Inas Amjed Almani

Department of Computer Technology Engineering, Al-Hadba University College, Iraq

Tawfeeq Alghazali

College of Media, Department of Journalism, The Islamic University in Najaf, Najaf, Iraq

Hasan Khalid Dabis

College of Islamic Science, Ahl Al Bayt University, Kerbala, Iraq

Atheer Taha Mohammed

The University of Mashreq, Iraq

Saad Ghazi Talib

Law Department, Al-Mustaqbal University College, Babylon, Iraq

Rawnaq Adnan Mahmood

Medical device engineering, Ashur University College, Baghdad, Iraq

Zahraa Tariq Sahi

Department of Dentistry, Al-Zahrawi University College, Karbala, Iraq

Yaqeen Mezaal

Al-Esraa University College, Baghdad, Iraq

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Salman O, Elhajj I, Chehab A, Kayssi A, “IoT survey: ...
  • Talal H, Zagrouba R, “MADS Based on DL Techniques on ...
  • Bagane P, Joseph SG, Singh A, Shrivastava A, Prabha B, ...
  • Maraveas C, Piromalis D, Arvanitis KG, Bartzanas T, Loukatos D, ...
  • Mohindru V, Vashishth S, Bathija D, “Internet of Things (IoT) ...
  • Phasinam K, Kassanuk T, Shinde PP, Thakar CM, Sharma DK, ...
  • Wu Y, Dai HN, Wang H, Xiong Z, Guo S, ...
  • Li C, Cao Z, “Lora networking techniques for large-scale and ...
  • Al-Hadhrami Y, Hussain FK, “DDoS attacks in IoT networks: a ...
  • Liang X, Kim Y, “A survey on security attacks and ...
  • Mishra N, Pandya S, “Internet of things applications, security challenges, ...
  • Bahaa A, Abdelaziz A, Sayed A, Elfangary L, Fahmy H, ...
  • Raju AD, Abualhaol IY, Giagone RS, Zhou Y, Huang S, ...
  • Dahl GE, Stokes JW, Deng L, Yu D, “Large-scale malware ...
  • Firdausi I, Erwin A, Nugroho AS, “Analysis of machine learning ...
  • Nguyen HT, Ngo QD, Le VH, “A novel graph-based approach ...
  • Alasmary H, Khormali A, Anwar A, Park J, Choi J, ...
  • Majid AA, Alshaibi AJ, Kostyuchenko E, Shelupanov A, “A review ...
  • Fukushima, K, “Neocognitron: a self-organizing neural network model for a ...
  • Ouhami M, Hafiane A, Es-Saady Y, El Hajji M, Canals ...
  • Zaidi SS, Ansari MS, Aslam A, Kanwal N, Asghar M, ...
  • Yang G, Ye Z, Zhang R, Huang K, “A comprehensive ...
  • Rasti B, Chang Y, Dalsasso E, Denis L, Ghamisi P, ...
  • Jaiswal T, “Image captioning through cognitive IOT and machine-learning approaches” ...
  • Nourani V, Molajou A, Najafi H, Danandeh Mehr A, “Emotional ...
  • Xu R, Lv P, Xu F, Shi Y, “A survey ...
  • Gunavathi C, Sivasubramanian K, Keerthika P, Paramasivam C, “A review ...
  • Sarker IH, “Deep cybersecurity: a comprehensive overview from neural network ...
  • He K, Zhang X, Ren S, Sun J, “Deep residual ...
  • Simonyan K, Zisserman A, “Very deep convolutional networks for large-scale ...
  • Li B, Lima D, “Facial expression recognition via ResNet-۵۰” International ...
  • Lu L, Jin P, Pang G, Zhang Z, Karniadakis GE, ...
  • Roelofs R, Shankar V, Recht B, Fridovich-Keil S, Hardt M, ...
  • Chen CT, Gu GX, “Generative deep neural networks for inverse ...
  • Liu T, Chen M, Zhou M, Du SS, Zhou E, ...
  • Seo S, Rim DJ, Lim M, Lee D, Park H, ...
  • Sitaula C, Hossain MB, “Attention-based VGG-۱۶ model for COVID-۱۹ chest ...
  • Krizhevsky A, Sutskever I, Hinton GE, “Imagenet classification with deep ...
  • Zhuang F, Qi Z, Duan K, Xi D, Zhu Y, ...
  • Neyshabur B, Sedghi H, Zhang C, “What is being transferred ...
  • F. Shahzad, M. Farooq, Elf-miner, “Using structural knowledge and data ...
  • Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai ...
  • Ngo QD, Nguyen HT, Le VH, Nguyen DH, “A survey ...
  • Su J, Vasconcellos DV, Prasad S, Sgandurra D, Feng Y, ...
  • نمایش کامل مراجع