Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices

Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has be...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2024, Vol.12, p.48570-48582
Hauptverfasser: Habib, Faiza, Shirazi, Syed Hamad, Aurangzeb, Khursheed, Khan, Asfandyar, Bhushan, Bharat, Alhussein, Musaed
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 48582
container_issue
container_start_page 48570
container_title IEEE access
container_volume 12
creator Habib, Faiza
Shirazi, Syed Hamad
Aurangzeb, Khursheed
Khan, Asfandyar
Bhushan, Bharat
Alhussein, Musaed
description Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.
doi_str_mv 10.1109/ACCESS.2024.3383831
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3033619321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10487938</ieee_id><doaj_id>oai_doaj_org_article_5897bdfa1f1a4949956cd31fe01190c4</doaj_id><sourcerecordid>3033619321</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-f26ce36b4b8439e6368df9dd7178de84508b8231af90c2efc2411693607ce3753</originalsourceid><addsrcrecordid>eNpNUcFKAzEQXURBUb9ADwHPrclONpt4k1q1UPXQCt5Cmp3U1Lqp2a2lf2_qFnHmMMPjvTcDL8suGO0zRtX17WAwnEz6Oc15H0CmZgfZSc6E6kEB4vDffpydN82CppIJKsqT7O0OcUWecR3NMo12E-JHQ1yIZFi_m9piRSZo19G32xtyhy3a1tdz8oSt-Qxx9e4teTLLjYlIfE1GYZpI395ic5YdObNs8Hw_T7PX--F08NgbvzyMBrfjnoVCtT2XC4sgZnwmOSgUIGTlVFWVrJQVSl5QOZM5MOMUtTk6m3OWXgdBy6QrCzjNRp1vFcxCr6L_NHGrg_H6Fwhxrk1svV2iLqQqZ5UzzDHDFVeqELYC5pAyltx58rrqvFYxfK2xafUirGOd3tdAAQRTkLPEgo5lY2iaiO7vKqN6l4juEtG7RPQ-kaS67FQeEf8puCxVIvwAZeuFqQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3033619321</pqid></control><display><type>article</type><title>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Habib, Faiza ; Shirazi, Syed Hamad ; Aurangzeb, Khursheed ; Khan, Asfandyar ; Bhushan, Bharat ; Alhussein, Musaed</creator><creatorcontrib>Habib, Faiza ; Shirazi, Syed Hamad ; Aurangzeb, Khursheed ; Khan, Asfandyar ; Bhushan, Bharat ; Alhussein, Musaed</creatorcontrib><description>Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3383831</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Artificial neural networks ; Biological system modeling ; Codes ; Computer security ; cyber security ; Cybersecurity ; Datasets ; Deep learning ; Internet ; Internet of Things ; IoT security ; Machine learning ; Malimg dataset ; Malware ; metamorphic malware detection ; Security ; Training</subject><ispartof>IEEE access, 2024, Vol.12, p.48570-48582</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c359t-f26ce36b4b8439e6368df9dd7178de84508b8231af90c2efc2411693607ce3753</cites><orcidid>0009-0006-2114-6764 ; 0000-0001-9534-4719 ; 0000-0003-3647-8578 ; 0009-0005-1936-7683 ; 0000-0002-5538-6778</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10487938$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,4014,27624,27914,27915,27916,54924</link.rule.ids></links><search><creatorcontrib>Habib, Faiza</creatorcontrib><creatorcontrib>Shirazi, Syed Hamad</creatorcontrib><creatorcontrib>Aurangzeb, Khursheed</creatorcontrib><creatorcontrib>Khan, Asfandyar</creatorcontrib><creatorcontrib>Bhushan, Bharat</creatorcontrib><creatorcontrib>Alhussein, Musaed</creatorcontrib><title>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</title><title>IEEE access</title><addtitle>Access</addtitle><description>Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.</description><subject>Artificial neural networks</subject><subject>Biological system modeling</subject><subject>Codes</subject><subject>Computer security</subject><subject>cyber security</subject><subject>Cybersecurity</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>IoT security</subject><subject>Machine learning</subject><subject>Malimg dataset</subject><subject>Malware</subject><subject>metamorphic malware detection</subject><subject>Security</subject><subject>Training</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUcFKAzEQXURBUb9ADwHPrclONpt4k1q1UPXQCt5Cmp3U1Lqp2a2lf2_qFnHmMMPjvTcDL8suGO0zRtX17WAwnEz6Oc15H0CmZgfZSc6E6kEB4vDffpydN82CppIJKsqT7O0OcUWecR3NMo12E-JHQ1yIZFi_m9piRSZo19G32xtyhy3a1tdz8oSt-Qxx9e4teTLLjYlIfE1GYZpI395ic5YdObNs8Hw_T7PX--F08NgbvzyMBrfjnoVCtT2XC4sgZnwmOSgUIGTlVFWVrJQVSl5QOZM5MOMUtTk6m3OWXgdBy6QrCzjNRp1vFcxCr6L_NHGrg_H6Fwhxrk1svV2iLqQqZ5UzzDHDFVeqELYC5pAyltx58rrqvFYxfK2xafUirGOd3tdAAQRTkLPEgo5lY2iaiO7vKqN6l4juEtG7RPQ-kaS67FQeEf8puCxVIvwAZeuFqQ</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Habib, Faiza</creator><creator>Shirazi, Syed Hamad</creator><creator>Aurangzeb, Khursheed</creator><creator>Khan, Asfandyar</creator><creator>Bhushan, Bharat</creator><creator>Alhussein, Musaed</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0006-2114-6764</orcidid><orcidid>https://orcid.org/0000-0001-9534-4719</orcidid><orcidid>https://orcid.org/0000-0003-3647-8578</orcidid><orcidid>https://orcid.org/0009-0005-1936-7683</orcidid><orcidid>https://orcid.org/0000-0002-5538-6778</orcidid></search><sort><creationdate>2024</creationdate><title>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</title><author>Habib, Faiza ; Shirazi, Syed Hamad ; Aurangzeb, Khursheed ; Khan, Asfandyar ; Bhushan, Bharat ; Alhussein, Musaed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-f26ce36b4b8439e6368df9dd7178de84508b8231af90c2efc2411693607ce3753</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Artificial neural networks</topic><topic>Biological system modeling</topic><topic>Codes</topic><topic>Computer security</topic><topic>cyber security</topic><topic>Cybersecurity</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>IoT security</topic><topic>Machine learning</topic><topic>Malimg dataset</topic><topic>Malware</topic><topic>metamorphic malware detection</topic><topic>Security</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Habib, Faiza</creatorcontrib><creatorcontrib>Shirazi, Syed Hamad</creatorcontrib><creatorcontrib>Aurangzeb, Khursheed</creatorcontrib><creatorcontrib>Khan, Asfandyar</creatorcontrib><creatorcontrib>Bhushan, Bharat</creatorcontrib><creatorcontrib>Alhussein, Musaed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Habib, Faiza</au><au>Shirazi, Syed Hamad</au><au>Aurangzeb, Khursheed</au><au>Khan, Asfandyar</au><au>Bhushan, Bharat</au><au>Alhussein, Musaed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>48570</spage><epage>48582</epage><pages>48570-48582</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Today Internet of Things (IoT) has become a key part of the modern world as it enables web-based IoT devices to collect, transfer, and analyze the data of individuals, companies, and industries. IoT provides numerous services and applications via a massive number of interconnected devices and has become an innovative attack vector for cyber-attacks and threats such as malware attacks that are currently regarded as serious dangers to the security of IoT devices and systems. Such threats are sufficient to infiltrate individual private information that inflicts harm to both the financial standing and reputation in an organization. In literature, researchers have used multiple machine learning and deep learning models to tackle this security threat, however, still accurate classification and detection of metamorphic malware in IoT devices remains a challenge. In this article, we used a deep learning model to accurately detect metamorphic malware in IoT devices. We have employed six models including (VGG16, InceptionV3, CNN, ResNet50, MobileNet, and Efficient NetB0 on Malimg publicly available malware image dataset. The Internet of Things (IoT) would benefit from having a method that could identify metamorphic malware. It isn't possible to rely on detection techniques that are fixed or signature-based. Throughout this research, a straightforward technique for carrying out dynamic analysis to comprehend the behavior of code is suggested. To determine if executable are malicious, it is necessary to first measure the behavior of executable and then utilize this information to make that determination. Additionally, the purpose of this study is to create a classifier that makes utilization of deep learning techniques to analyze complicated behavior reports. The obtained results depict that the proposed model achieves a promising accuracy of 99% and F1-score of 97% employed on the standard Malimg dataset as compared to other existing machine and deep learning models.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3383831</doi><tpages>13</tpages><orcidid>https://orcid.org/0009-0006-2114-6764</orcidid><orcidid>https://orcid.org/0000-0001-9534-4719</orcidid><orcidid>https://orcid.org/0000-0003-3647-8578</orcidid><orcidid>https://orcid.org/0009-0005-1936-7683</orcidid><orcidid>https://orcid.org/0000-0002-5538-6778</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2024, Vol.12, p.48570-48582
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_3033619321
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Artificial neural networks
Biological system modeling
Codes
Computer security
cyber security
Cybersecurity
Datasets
Deep learning
Internet
Internet of Things
IoT security
Machine learning
Malimg dataset
Malware
metamorphic malware detection
Security
Training
title Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T05%3A13%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deep%20Neural%20Networks%20for%20Enhanced%20Security:%20Detecting%20Metamorphic%20Malware%20in%20IoT%20Devices&rft.jtitle=IEEE%20access&rft.au=Habib,%20Faiza&rft.date=2024&rft.volume=12&rft.spage=48570&rft.epage=48582&rft.pages=48570-48582&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3383831&rft_dat=%3Cproquest_cross%3E3033619321%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3033619321&rft_id=info:pmid/&rft_ieee_id=10487938&rft_doaj_id=oai_doaj_org_article_5897bdfa1f1a4949956cd31fe01190c4&rfr_iscdi=true