IoTMalware: Android IoT Malware Detection based on Deep Neural Network
and Blockchain Technology
- URL: http://arxiv.org/abs/2102.13376v1
- Date: Fri, 26 Feb 2021 09:51:23 GMT
- Title: IoTMalware: Android IoT Malware Detection based on Deep Neural Network
and Blockchain Technology
- Authors: Rajesh Kumar, WenYong Wang, Jay Kumar, Zakria, Ting Yang, Waqar Ali
and Abubackar Sharif
- Abstract summary: This paper proposes a new framework based on the blockchain and deep learning model to provide more security for Android IoT devices.
The proposed deep learning model analyzes various static and dynamic features extracted from thousands of feature of malware and benign apps.
A customized smart contract is designed to detect deceptive applications through the blockchain framework.
- Score: 6.254288297784753
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The Internet of Things (IoT) has been revolutionizing this world by
introducing exciting applications almost in all walks of daily life, such as
healthcare, smart cities, smart environments, safety, remote sensing, and many
more. This paper proposes a new framework based on the blockchain and deep
learning model to provide more security for Android IoT devices. Moreover, our
framework is capable to find the malware activities in a real-time environment.
The proposed deep learning model analyzes various static and dynamic features
extracted from thousands of feature of malware and benign apps that are already
stored in blockchain distributed ledger. The multi-layer deep learning model
makes decisions by analyzing the previous data and follow some steps. Firstly,
it divides the malware feature into multiple level clusters. Secondly, it
chooses a unique deep learning model for each malware feature set or cluster.
Finally, it produces the decision by combining the results generated from all
cluster levels. Furthermore, the decisions and multiple-level clustering data
are stored in a blockchain that can be further used to train every specialized
cluster for unique data distribution. Also, a customized smart contract is
designed to detect deceptive applications through the blockchain framework. The
smart contract verifies the malicious application both during the uploading and
downloading process of Android apps on the network. Consequently, the proposed
framework provides flexibility to features for run-time security regarding
malware detection on heterogeneous IoT devices. Finally, the smart contract
helps to approve or deny to uploading and downloading harmful Android
applications.
Related papers
- Intelligent Detection of Non-Essential IoT Traffic on the Home Gateway [45.70482328441101]
This work presents ML-IoTrim, a system for detecting and mitigating non-essential IoT traffic by analyzing network behavior at the edge.
We test our framework in a consumer smart home setup with IoT devices from five categories, demonstrating that the model can accurately identify and block non-essential traffic.
This research advances privacy-aware traffic control in smart homes, paving the way for future developments in IoT device privacy.
arXiv Detail & Related papers (2025-04-22T09:40:05Z) - Omnichain Web: The Universal Framework for Streamlined Chain Abstraction and Cross-Layer Interaction [0.0]
Dojima's Omnichain Web introduces a universal framework that abstracts blockchain complexity, bridging Web2, Web3, and AI.
At its core, OmniRollups facilitate scalable execution across chains, while the Omni Sequencer ensures atomic, secure intent processing.
Linera microchains enable AI-driven transaction automation, seamlessly integrating with Web3 data streams.
arXiv Detail & Related papers (2024-11-15T12:06:00Z) - BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - Blockchains for Internet of Things: Fundamentals, Applications, and Challenges [38.29453164670072]
Not every blockchain system is suitable for specific IoT applications.
Public blockchains are not suitable for storing sensitive data.
We explore the blockchain's application in three pivotal IoT areas: edge AI, communications, and healthcare.
arXiv Detail & Related papers (2024-05-08T04:25:57Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing [1.381577845997074]
We design STarEdgeChain, a security and privacy aware message dissemination in IoT to show how blockchain along with advanced cryptographic techniques are devoted to address such concerns.
In fact, the STarEdgeChain employs a permissioned blockchain assisted edge computing in order to expedite a single signcrypted message dissemination among targeted groups of devices.
arXiv Detail & Related papers (2024-01-12T05:19:51Z) - Architectural Design for Secure Smart Contract Development [0.0]
Several attacks on blockchain infrastructures have resulted in hundreds of millions of dollars lost and sensitive information compromised.
I identify common software vulnerabilities and attacks on blockchain infrastructures.
I propose a model for ensuring a stronger security standard for future systems leveraging smart contracts.
arXiv Detail & Related papers (2024-01-03T18:59:17Z) - A Survey of Machine Learning Algorithms for Detecting Malware in IoT
Firmware [0.0]
This paper employs a number of machine learning algorithms to classify IoT firmware and the best performing models are reported.
Deep learning approaches including Convolutional and Fully Connected Neural Networks are also explored.
arXiv Detail & Related papers (2021-11-03T17:55:51Z) - Lightweight IoT Malware Detection Solution Using CNN Classification [2.288885651912488]
The security aspect of IoT devices is an infant field, which is why it is our focus in this paper.
We developed a system that can recognize malicious behavior of a specific IoT node on the network.
Through convolutional neural network and monitoring, we were able to provide malware detection for IoT using a central node that can be installed within the network.
arXiv Detail & Related papers (2020-10-13T10:56:33Z) - Lightweight Collaborative Anomaly Detection for the IoT using Blockchain [40.52854197326305]
Internet of things (IoT) devices tend to have many vulnerabilities which can be exploited by an attacker.
Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner.
We present a distributed IoT simulation platform, which consists of 48 Raspberry Pis.
arXiv Detail & Related papers (2020-06-18T14:50:08Z) - Federated and continual learning for classification tasks in a society
of devices [59.45414406974091]
Light Federated and Continual Consensus (LFedCon2) is a new federated and continual architecture that uses light, traditional learners.
Our method allows powerless devices (such as smartphones or robots) to learn in real time, locally, continuously, autonomously and from users.
In order to test our proposal, we have applied it in a heterogeneous community of smartphone users to solve the problem of walking recognition.
arXiv Detail & Related papers (2020-06-12T12:37:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.