Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices
Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has be...
Gespeichert in:
Veröffentlicht in: | IEEE access 2024, Vol.12, p.48570-48582 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 48582 |
---|---|
container_issue | |
container_start_page | 48570 |
container_title | IEEE access |
container_volume | 12 |
creator | Habib, Faiza Shirazi, Syed Hamad Aurangzeb, Khursheed Khan, Asfandyar Bhushan, Bharat Alhussein, Musaed |
description | Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models. |
doi_str_mv | 10.1109/ACCESS.2024.3383831 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3033619321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10487938</ieee_id><doaj_id>oai_doaj_org_article_5897bdfa1f1a4949956cd31fe01190c4</doaj_id><sourcerecordid>3033619321</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-f26ce36b4b8439e6368df9dd7178de84508b8231af90c2efc2411693607ce3753</originalsourceid><addsrcrecordid>eNpNUcFKAzEQXURBUb9ADwHPrclONpt4k1q1UPXQCt5Cmp3U1Lqp2a2lf2_qFnHmMMPjvTcDL8suGO0zRtX17WAwnEz6Oc15H0CmZgfZSc6E6kEB4vDffpydN82CppIJKsqT7O0OcUWecR3NMo12E-JHQ1yIZFi_m9piRSZo19G32xtyhy3a1tdz8oSt-Qxx9e4teTLLjYlIfE1GYZpI395ic5YdObNs8Hw_T7PX--F08NgbvzyMBrfjnoVCtT2XC4sgZnwmOSgUIGTlVFWVrJQVSl5QOZM5MOMUtTk6m3OWXgdBy6QrCzjNRp1vFcxCr6L_NHGrg_H6Fwhxrk1svV2iLqQqZ5UzzDHDFVeqELYC5pAyltx58rrqvFYxfK2xafUirGOd3tdAAQRTkLPEgo5lY2iaiO7vKqN6l4juEtG7RPQ-kaS67FQeEf8puCxVIvwAZeuFqQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3033619321</pqid></control><display><type>article</type><title>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Habib, Faiza ; Shirazi, Syed Hamad ; Aurangzeb, Khursheed ; Khan, Asfandyar ; Bhushan, Bharat ; Alhussein, Musaed</creator><creatorcontrib>Habib, Faiza ; Shirazi, Syed Hamad ; Aurangzeb, Khursheed ; Khan, Asfandyar ; Bhushan, Bharat ; Alhussein, Musaed</creatorcontrib><description>Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3383831</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Artificial neural networks ; Biological system modeling ; Codes ; Computer security ; cyber security ; Cybersecurity ; Datasets ; Deep learning ; Internet ; Internet of Things ; IoT security ; Machine learning ; Malimg dataset ; Malware ; metamorphic malware detection ; Security ; Training</subject><ispartof>IEEE access, 2024, Vol.12, p.48570-48582</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c359t-f26ce36b4b8439e6368df9dd7178de84508b8231af90c2efc2411693607ce3753</cites><orcidid>0009-0006-2114-6764 ; 0000-0001-9534-4719 ; 0000-0003-3647-8578 ; 0009-0005-1936-7683 ; 0000-0002-5538-6778</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10487938$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,4014,27624,27914,27915,27916,54924</link.rule.ids></links><search><creatorcontrib>Habib, Faiza</creatorcontrib><creatorcontrib>Shirazi, Syed Hamad</creatorcontrib><creatorcontrib>Aurangzeb, Khursheed</creatorcontrib><creatorcontrib>Khan, Asfandyar</creatorcontrib><creatorcontrib>Bhushan, Bharat</creatorcontrib><creatorcontrib>Alhussein, Musaed</creatorcontrib><title>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</title><title>IEEE access</title><addtitle>Access</addtitle><description>Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.</description><subject>Artificial neural networks</subject><subject>Biological system modeling</subject><subject>Codes</subject><subject>Computer security</subject><subject>cyber security</subject><subject>Cybersecurity</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>IoT security</subject><subject>Machine learning</subject><subject>Malimg dataset</subject><subject>Malware</subject><subject>metamorphic malware detection</subject><subject>Security</subject><subject>Training</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUcFKAzEQXURBUb9ADwHPrclONpt4k1q1UPXQCt5Cmp3U1Lqp2a2lf2_qFnHmMMPjvTcDL8suGO0zRtX17WAwnEz6Oc15H0CmZgfZSc6E6kEB4vDffpydN82CppIJKsqT7O0OcUWecR3NMo12E-JHQ1yIZFi_m9piRSZo19G32xtyhy3a1tdz8oSt-Qxx9e4teTLLjYlIfE1GYZpI395ic5YdObNs8Hw_T7PX--F08NgbvzyMBrfjnoVCtT2XC4sgZnwmOSgUIGTlVFWVrJQVSl5QOZM5MOMUtTk6m3OWXgdBy6QrCzjNRp1vFcxCr6L_NHGrg_H6Fwhxrk1svV2iLqQqZ5UzzDHDFVeqELYC5pAyltx58rrqvFYxfK2xafUirGOd3tdAAQRTkLPEgo5lY2iaiO7vKqN6l4juEtG7RPQ-kaS67FQeEf8puCxVIvwAZeuFqQ</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Habib, Faiza</creator><creator>Shirazi, Syed Hamad</creator><creator>Aurangzeb, Khursheed</creator><creator>Khan, Asfandyar</creator><creator>Bhushan, Bharat</creator><creator>Alhussein, Musaed</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0006-2114-6764</orcidid><orcidid>https://orcid.org/0000-0001-9534-4719</orcidid><orcidid>https://orcid.org/0000-0003-3647-8578</orcidid><orcidid>https://orcid.org/0009-0005-1936-7683</orcidid><orcidid>https://orcid.org/0000-0002-5538-6778</orcidid></search><sort><creationdate>2024</creationdate><title>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</title><author>Habib, Faiza ; Shirazi, Syed Hamad ; Aurangzeb, Khursheed ; Khan, Asfandyar ; Bhushan, Bharat ; Alhussein, Musaed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-f26ce36b4b8439e6368df9dd7178de84508b8231af90c2efc2411693607ce3753</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Artificial neural networks</topic><topic>Biological system modeling</topic><topic>Codes</topic><topic>Computer security</topic><topic>cyber security</topic><topic>Cybersecurity</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>IoT security</topic><topic>Machine learning</topic><topic>Malimg dataset</topic><topic>Malware</topic><topic>metamorphic malware detection</topic><topic>Security</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Habib, Faiza</creatorcontrib><creatorcontrib>Shirazi, Syed Hamad</creatorcontrib><creatorcontrib>Aurangzeb, Khursheed</creatorcontrib><creatorcontrib>Khan, Asfandyar</creatorcontrib><creatorcontrib>Bhushan, Bharat</creatorcontrib><creatorcontrib>Alhussein, Musaed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Habib, Faiza</au><au>Shirazi, Syed Hamad</au><au>Aurangzeb, Khursheed</au><au>Khan, Asfandyar</au><au>Bhushan, Bharat</au><au>Alhussein, Musaed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>48570</spage><epage>48582</epage><pages>48570-48582</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3383831</doi><tpages>13</tpages><orcidid>https://orcid.org/0009-0006-2114-6764</orcidid><orcidid>https://orcid.org/0000-0001-9534-4719</orcidid><orcidid>https://orcid.org/0000-0003-3647-8578</orcidid><orcidid>https://orcid.org/0009-0005-1936-7683</orcidid><orcidid>https://orcid.org/0000-0002-5538-6778</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2024, Vol.12, p.48570-48582 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_3033619321 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Artificial neural networks Biological system modeling Codes Computer security cyber security Cybersecurity Datasets Deep learning Internet Internet of Things IoT security Machine learning Malimg dataset Malware metamorphic malware detection Security Training |
title | Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T05%3A13%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deep%20Neural%20Networks%20for%20Enhanced%20Security:%20Detecting%20Metamorphic%20Malware%20in%20IoT%20Devices&rft.jtitle=IEEE%20access&rft.au=Habib,%20Faiza&rft.date=2024&rft.volume=12&rft.spage=48570&rft.epage=48582&rft.pages=48570-48582&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3383831&rft_dat=%3Cproquest_cross%3E3033619321%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3033619321&rft_id=info:pmid/&rft_ieee_id=10487938&rft_doaj_id=oai_doaj_org_article_5897bdfa1f1a4949956cd31fe01190c4&rfr_iscdi=true |