Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Nov 29;22(23):9305.
doi: 10.3390/s22239305.

Malware Detection in Internet of Things (IoT) Devices Using Deep Learning

Affiliations

Malware Detection in Internet of Things (IoT) Devices Using Deep Learning

Sharjeel Riaz et al. Sensors (Basel). .

Abstract

Internet of Things (IoT) devices usage is increasing exponentially with the spread of the internet. With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, malware detection becomes an important issue in IoT devices. An effective, reliable, and time-efficient mechanism is required for the identification of sophisticated malware. Researchers have proposed multiple methods for malware detection in recent years, however, accurate detection remains a challenge. We propose a deep learning-based ensemble classification method for the detection of malware in IoT devices. It uses a three steps approach; in the first step, data is preprocessed using scaling, normalization, and de-noising, whereas in the second step, features are selected and one hot encoding is applied followed by the ensemble classifier based on CNN and LSTM outputs for detection of malware. We have compared results with the state-of-the-art methods and our proposed method outperforms the existing methods on standard datasets with an average accuracy of 99.5%.

Keywords: CNN; Internet of Things; LSTM; malware detection.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Proposed system model for hybrid deep learning malware detection algorithms.
Figure 2
Figure 2
Proposed flow for hybrid machine learning malware detection algorithms.
Figure 3
Figure 3
Opcode extraction.
Figure 4
Figure 4
Testing time of machine learning algorithms.
Figure 5
Figure 5
(a) Confusion matrix for Hybrid CNN-LSTM (b) Confusion matrix for PSO-KNN.

Similar articles

Cited by

References

    1. Mendez D.M., Papapanagiotou I., Yang B. Internet of things: Survey on security and privacy. arXiv. 20171707.01879
    1. Tama B.A., Rhee K.H. An integration of pso-based feature selection and random forest for anomaly detection in iot network. MATEC Web Conf. 2018;159:01053. doi: 10.1051/matecconf/201815901053. - DOI
    1. Naeem H., Ullah F., Naeem M.R., Khalid S., Vasan D., Jabbar S., Saeed S. Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Netw. 2020;105:102154. doi: 10.1016/j.adhoc.2020.102154. - DOI
    1. Moti Z., Hashemi S., Karimipour H., Dehghantanha A., Jahromi A.N., Abdi L., Alavi F. Generative adversarial network to detect unseen internet of things malware. Ad Hoc Netw. 2021;122:102591. doi: 10.1016/j.adhoc.2021.102591. - DOI
    1. Humayun M., Jhanjhi N., Alsayat A., Ponnusamy V. Internet of things and ransomware: Evolution, mitigation and prevention. Egypt. Inform. J. 2021;22:105–117. doi: 10.1016/j.eij.2020.05.003. - DOI

LinkOut - more resources