Harnessing the Power of Decision Trees to Detect IoT Malware
- URL: http://arxiv.org/abs/2301.12039v1
- Date: Sat, 28 Jan 2023 00:56:10 GMT
- Title: Harnessing the Power of Decision Trees to Detect IoT Malware
- Authors: Marwan Omar
- Abstract summary: Internet of Things (IoT) is susceptible to malware attacks.
Current methods and analysis,using static methods, are ineffective.
In this paper, we propose a novel detection and analysis method that harnesses the power of decision trees.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Due to its simple installation and connectivity, the Internet of Things (IoT)
is susceptible to malware attacks. Being able to operate autonomously. As IoT
devices have become more prevalent, they have become the most tempting targets
for malware. Weak, guessable, or hard-coded passwords, and a lack of security
measures contribute to these vulnerabilities along with insecure network
connections and outdated update procedures. To understand IoT malware, current
methods and analysis ,using static methods, are ineffective. The field of deep
learning has made great strides in recent years due to their tremendous data
mining, learning, and expression capabilities, cybersecurity has enjoyed
tremendous growth in recent years. As a result, malware analysts will not have
to spend as much time analyzing malware. In this paper, we propose a novel
detection and analysis method that harnesses the power and simplicity of
decision trees. The experiments are conducted using a real word dataset,
MaleVis which is a publicly available dataset. Based on the results, we show
that our proposed approach outperforms existing state-of-the-art solutions in
that it achieves 97.23% precision and 95.89% recall in terms of detection and
classification. A specificity of 96.58%, F1-score of 96.40%, an accuracy of
96.43.
Related papers
- Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges [0.0]
The Internet of Things (IoT) is one of the fastest-growing computing industries.
Traditional malware detection methods are becoming ineffective against these new types of malware.
Machine Learning (ML) and Deep Learning (DL) approaches have proven effective in dealing with these new IoT malware variants.
arXiv Detail & Related papers (2024-10-14T19:04:43Z) - Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security [0.6856683556201506]
Malicious applications, commonly known as malware, pose a significant threat to IoT devices and networks.
We present a novel resource- and workload-aware malware detection framework integrated with distributed computing for IoT networks.
arXiv Detail & Related papers (2024-04-12T21:11:29Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Malware Analysis on AI Technique [0.0]
Therefore, Malware analysis is needed in order to secure the system.
Due to the cheap cost of technology, artificial intelligence has also become less difficult to implement in projects to analyse malware.
The categorization and analysis of malware on OS using various AI-based analysis techniques are covered in this paper.
arXiv Detail & Related papers (2023-11-24T14:16:59Z) - A survey on hardware-based malware detection approaches [45.24207460381396]
Hardware-based malware detection approaches leverage hardware performance counters and machine learning prowess.
We meticulously analyze the approach, unraveling the most common methods, algorithms, tools, and datasets that shape its contours.
The discussion extends to crafting mixed hardware and software approaches for collaborative efficacy, essential enhancements in hardware monitoring units, and a better understanding of the correlation between hardware events and malware applications.
arXiv Detail & Related papers (2023-03-22T13:00:41Z) - DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified
Robustness [58.23214712926585]
We develop a certified defense, DRSM (De-Randomized Smoothed MalConv), by redesigning the de-randomized smoothing technique for the domain of malware detection.
Specifically, we propose a window ablation scheme to provably limit the impact of adversarial bytes while maximally preserving local structures of the executables.
We are the first to offer certified robustness in the realm of static detection of malware executables.
arXiv Detail & Related papers (2023-03-20T17:25:22Z) - SETTI: A Self-supervised Adversarial Malware Detection Architecture in
an IoT Environment [20.586904296213007]
We propose an adversarial self-supervised architecture for detecting malware in Internet of Things networks, SETTI.
In the SETTI architecture, we design three self-supervised attack techniques, namely Self-MDS, GSelf-MDS and ASelf-MDS.
To validate the attack and defence algorithms, we conduct experiments on two recent IoT datasets: IoT23 and NBIoT.
arXiv Detail & Related papers (2022-04-16T10:10:59Z) - Mate! Are You Really Aware? An Explainability-Guided Testing Framework
for Robustness of Malware Detectors [49.34155921877441]
We propose an explainability-guided and model-agnostic testing framework for robustness of malware detectors.
We then use this framework to test several state-of-the-art malware detectors' abilities to detect manipulated malware.
Our findings shed light on the limitations of current malware detectors, as well as how they can be improved.
arXiv Detail & Related papers (2021-11-19T08:02:38Z) - Malware Squid: A Novel IoT Malware Traffic Analysis Framework using
Convolutional Neural Network and Binary Visualisation [2.309914459672557]
We introduce a novel IoT malware traffic analysis approach using neural network and binary visualisation.
The prime motivation of the proposed approach is to faster detect and classify new malware (zero-day malware)
arXiv Detail & Related papers (2021-09-08T00:21:45Z) - Being Single Has Benefits. Instance Poisoning to Deceive Malware
Classifiers [47.828297621738265]
We show how an attacker can launch a sophisticated and efficient poisoning attack targeting the dataset used to train a malware classifier.
As opposed to other poisoning attacks in the malware detection domain, our attack does not focus on malware families but rather on specific malware instances that contain an implanted trigger.
We propose a comprehensive detection approach that could serve as a future sophisticated defense against this newly discovered severe threat.
arXiv Detail & Related papers (2020-10-30T15:27:44Z) - Adversarial vs behavioural-based defensive AI with joint, continual and
active learning: automated evaluation of robustness to deception, poisoning
and concept drift [62.997667081978825]
Recent advancements in Artificial Intelligence (AI) have brought new capabilities to behavioural analysis (UEBA) for cyber-security.
In this paper, we present a solution to effectively mitigate this attack by improving the detection process and efficiently leveraging human expertise.
arXiv Detail & Related papers (2020-01-13T13:54:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.