IoT Malware Detection Architecture using a Novel Channel Boosted and
Squeezed CNN
- URL: http://arxiv.org/abs/2202.04121v1
- Date: Tue, 8 Feb 2022 19:55:35 GMT
- Title: IoT Malware Detection Architecture using a Novel Channel Boosted and
Squeezed CNN
- Authors: Muhammad Asam, Saddam Hussain Khan, Tauseef Jamal, Asifullah Khan
- Abstract summary: This study proposes a novel IoT Malware Detection Architecture (iMDA) using squeezing and boosting dilated convolutional neural network (CNN)
The proposed architecture exploits the concepts of edge and smoothing, multi-path dilated convolutional operations, channel squeezing, and boosting in CNN.
The proposed iMDA has achieved Accuracy: 97.93%, F1-Score: 0.9394, Precision: 0.9864, MCC: 0.
- Score: 0.28675177318965034
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Interaction between devices, people, and the Internet has given birth to a
new digital communication model, the Internet of Things (IoT). The seamless
network of these smart devices is the core of this IoT model. However, on the
other hand, integrating smart devices to constitute a network introduces many
security challenges. These connected devices have created a security blind
spot, where cybercriminals can easily launch an attack to compromise the
devices using malware proliferation techniques. Therefore, malware detection is
considered a lifeline for the survival of IoT devices against cyberattacks.
This study proposes a novel IoT Malware Detection Architecture (iMDA) using
squeezing and boosting dilated convolutional neural network (CNN). The proposed
architecture exploits the concepts of edge and smoothing, multi-path dilated
convolutional operations, channel squeezing, and boosting in CNN. Edge and
smoothing operations are employed with split-transform-merge (STM) blocks to
extract local structure and minor contrast variation in the malware images. STM
blocks performed multi-path dilated convolutional operations, which helped
recognize the global structure of malware patterns. Additionally, channel
squeezing and merging helped to get the prominent reduced and diverse feature
maps, respectively. Channel squeezing and boosting are applied with the help of
STM block at the initial, middle and final levels to capture the texture
variation along with the depth for the sake of malware pattern hunting. The
proposed architecture has shown substantial performance compared with the
customized CNN models. The proposed iMDA has achieved Accuracy: 97.93%,
F1-Score: 0.9394, Precision: 0.9864, MCC: 0. 8796, Recall: 0.8873, AUC-PR:
0.9689 and AUC-ROC: 0.9938.
Related papers
- SHEATH: Defending Horizontal Collaboration for Distributed CNNs against Adversarial Noise [1.0415834763540737]
This paper presents a novel framework for Secure Horizontal Edge with Adrial Threat Handling (SHEATH)
SHEATH aims to address vulnerabilities without requiring complete knowledge of the CNN model in HC edge architectures.
Our evaluations demonstrate SHEATH's adaptability and effectiveness across diverse CNN configurations.
arXiv Detail & Related papers (2024-09-25T18:45:04Z) - SqueezerFaceNet: Reducing a Small Face Recognition CNN Even More Via
Filter Pruning [55.84746218227712]
We develop SqueezerFaceNet, a light face recognition network which less than 1M parameters.
We show that it can be further reduced (up to 40%) without an appreciable loss in performance.
arXiv Detail & Related papers (2023-07-20T08:38:50Z) - Publishing Efficient On-device Models Increases Adversarial
Vulnerability [58.6975494957865]
In this paper, we study the security considerations of publishing on-device variants of large-scale models.
We first show that an adversary can exploit on-device models to make attacking the large models easier.
We then show that the vulnerability increases as the similarity between a full-scale and its efficient model increase.
arXiv Detail & Related papers (2022-12-28T05:05:58Z) - Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial
Attacks [70.51799606279883]
We introduce test-time adversarial attacks on deep neural networks (DNNs) for semantic communications.
We show that it is possible to change the semantics of the transferred information even when the reconstruction loss remains low.
arXiv Detail & Related papers (2022-12-20T17:13:22Z) - A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection [0.0]
Security issues are threatened in various types of networks, especially in the Internet of Things (IoT) environment.
We have developed a new malware detection framework, Deep Squeezed-Boosted and Ensemble Learning (DSBEL), comprised of novel Squeezed-Boosted Boundary-Region Split-Transform-Merge (SB-BR-STM) CNN and ensemble learning.
arXiv Detail & Related papers (2022-12-15T18:14:51Z) - Intrusion Detection in Internet of Things using Convolutional Neural
Networks [4.718295605140562]
We propose a novel solution to the intrusion attacks against IoT devices using CNNs.
The data is encoded as the convolutional operations to capture the patterns from the sensors data along time.
The experimental results show significant improvement in both true positive rate and false positive rate compared to the baseline using LSTM.
arXiv Detail & Related papers (2022-11-18T07:27:07Z) - FPGA-optimized Hardware acceleration for Spiking Neural Networks [69.49429223251178]
This work presents the development of a hardware accelerator for an SNN, with off-line training, applied to an image recognition task.
The design targets a Xilinx Artix-7 FPGA, using in total around the 40% of the available hardware resources.
It reduces the classification time by three orders of magnitude, with a small 4.5% impact on the accuracy, if compared to its software, full precision counterpart.
arXiv Detail & Related papers (2022-01-18T13:59:22Z) - A Survey of Machine Learning Algorithms for Detecting Malware in IoT
Firmware [0.0]
This paper employs a number of machine learning algorithms to classify IoT firmware and the best performing models are reported.
Deep learning approaches including Convolutional and Fully Connected Neural Networks are also explored.
arXiv Detail & Related papers (2021-11-03T17:55:51Z) - WNARS: WFST based Non-autoregressive Streaming End-to-End Speech
Recognition [59.975078145303605]
We propose a novel framework, namely WNARS, using hybrid CTC-attention AED models and weighted finite-state transducers.
On the AISHELL-1 task, our WNARS achieves a character error rate of 5.22% with 640ms latency, to the best of our knowledge, which is the state-of-the-art performance for online ASR.
arXiv Detail & Related papers (2021-04-08T07:56:03Z) - Classifying Malware Images with Convolutional Neural Network Models [2.363388546004777]
In this paper, we use several convolutional neural network (CNN) models for static malware classification.
The Inception V3 model achieves a test accuracy of 99.24%, which is better than the accuracy of 98.52% achieved by the current state-of-the-art system.
arXiv Detail & Related papers (2020-10-30T07:39:30Z) - Cassandra: Detecting Trojaned Networks from Adversarial Perturbations [92.43879594465422]
In many cases, pre-trained models are sourced from vendors who may have disrupted the training pipeline to insert Trojan behaviors into the models.
We propose a method to verify if a pre-trained model is Trojaned or benign.
Our method captures fingerprints of neural networks in the form of adversarial perturbations learned from the network gradients.
arXiv Detail & Related papers (2020-07-28T19:00:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.