Enhancing IoT Device Security: N-Gram Sequence Algorithm for Malware Detection

Categories: ScienceTechnology

Abstract

Recent advances in Internet of Things (IoT) technologies require a new type of IoT security environment. Various heterogeneous smart devices have easy access to IoT environment, and as the number of users increases, they are exposed to various threats such as malicious attacks on IoT devices and IoT infrastructure, and data tampering by malicious code. Malware detection in IoT requires data and models for continuous and changing learning of smart devices. Methods/Statistical analysis: To minimize these security threats, various malware detection techniques in the field of IoT security have been studied.

Malware detection in IoT environment is important for data derivation and learning model required for continuous and changing learning of smart devices. The metadata of malware detection can be normalized by the value of device id, time, behavior, location and state. This paper proposes behavior-based malware detection using deep learning (BMD-DL).

Findings: BMD-DL was able to collect metadata about behavior-based malicious behavior and learn and detect malicious codes through deep learning.

Get quality help now
Bella Hamilton
Bella Hamilton
checked Verified writer

Proficient in: Science

star star star star 5 (234)

“ Very organized ,I enjoyed and Loved every bit of our professional interaction ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

In addition, through the learned model, IoT Security is provided by disconnecting malicious devices that cause malicious behavior in the IoT environment. Improvements/Applications: BMD-DL collects behavioral data generated from multiple devices in the IoT and applies the results learned through deep learning to detect persistent malware.

Introduction

A run of the mill Internet of Things (IoT) organization incorporates a wide unavoidable system of (keen) Internet-associated gadgets, Internet-associated vehicles, inserted frameworks, sensors, and different gadgets/frameworks that self-sufficiently sense, store, move and procedure gathered information IoT gadgets in a regular citizen setting incorporates wellbeing, farming, keen city, and vitality and transport the executive’s frameworks.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

IoT can likewise be sent in antagonistic settings, for example, front lines. For instance in 2017, U.S. Armed force Research Laboratory (ARL) 'built up an Enterprise way to deal with address the difficulties coming about because of the Internet of Battlefield Things (IoBT) that couples multi-disciplinary inward research with extramural research and cooperative endeavors.

ARL expects to set up new shared endeavor (the IoBT CRA) that looks to build up the establishments of IoBT with regards to future Army tasks There are supporting security and protection worries in such IoT condition. While IoT and IoBT share a significant number of the supporting digital security dangers (for example malware disease [14]), the touchy idea of IoBT arrangement (for example military and fighting) makes IoBT engineering and gadgets bound to be focused by digital lawbreakers.

Moreover, entertainers who target IoBT gadgets and foundation are bound to be state-supported, better resourced, and expertly prepared. Interruption and malware recognition and anticipation are two dynamic research regions. Be that as it may, the asset obliged nature of most IoT and IoBT gadgets and altered working frameworks, existing ordinary interruption and malware recognition and counteraction arrangements are probably not going to be appropriate for true sending. For instance, IoT malware may misuse low level vulnerabilities present in undermined IoT gadgets or vulnerabilities explicit to certain IoT gadgets (e.g., Stuxnet, a malware allegedly intended to target atomic plants, are probably going to be 'innocuous' to buyer gadgets, for example, Android and iOS gadgets and PCs). In this manner, it is important to answer the requirement for IoT and IoBT explicit malware location.

The Internet of Things (IoT) is the latest Internet evolution that incorporates a diverse range of things such as sensors, actuators, and services deployed by different organizations and individuals to support a variety of applications. The information captured by IoTpresent an unprecedented opportunity to solve large-scale problems in those application domains to deliver services; example applications include precision agriculture, environment monitoring, smart health, smart manufacturing, and smart cities. Like all other Internet based services in the past, IoT-based services are also being developed and deployed without security consideration. By nature, IoT devices and services are vulnerable tomalicious cyber threats as they cannot be given the same protection that is received by enterprise services within an enterprise perimeter.

While IoT services will play an important role in our daily life resulting in improved productivity and quality of life, the trend has also 'encouraged' cyber-exploitation and evolution and diversification of malicious cyber threats. Hence, there is a need for coordinated efforts from the research community to address resulting concerns, such as those presented in this special section. Several potential research topics are also identified in this special section. X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo, “A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments,” Journal of Network and Computer Applications, 2017.

Internet of Things (IoT) is an emerging technology, which makes the remote sensing and control across heterogeneous network a reality, and has good prospects in industrial applications. As an important infrastructure, Wireless Sensor Networks (WSNs) play a crucial role in industrial IoT. Due to the resource constrained feature of sensor nodes, the design of security and efficiency balanced authentication scheme for WSNs becomes a big challenge in IoT applications.

First, a two-factor authentication scheme for WSNs proposed by Jiang et al. is reviewed, and the functional and security flaws of their scheme are analyzed. Then, we proposed a three-factor anonymous authentication scheme for WSNs in Internet of Things environments, where fuzzy commitment scheme is adopted to handle the user's biometric information. Analysis and comparison results show that the proposed scheme keeps computational efficiency, and also achieves more security and functional features. Compared with other related work, the proposed scheme is more suitable for Internet of Things.

Proposed System

As far as we could possibly know, this is the first OpCodebased profound learning strategy for IoT and IoBT malware location. We at that point show the strength of our proposed approach, against existing OpCode based malware location frameworks. We additionally show the adequacy of our proposed approach against garbage code inclusion assaults. In particular, our proposed approach utilizes a class-wise element determination system to overrule less significant OpCodes so as to oppose garbage code addition assaults. Besides, we influence all components of Eigenspace to expand identification rate and maintainability. At long last, as an auxiliary commitment, we share a standardized dataset of IoT malware and kindhearted applications2, which might be utilized by individual analysts to assess and benchmark future malware location draws near.

Then again, since the proposed strategy has a place with OpCode based discovery class, it could be versatile for non-IoT stages. IoT and IoBT application are probably going to comprise of a long succession of OpCodes, which are guidelines to be performed on gadget preparing unit. So as to dismantle tests, we used Objdump (GNU binutils adaptation 2.27.90) as a disassembler to remove the OpCodes. Making n-gram Op-Code grouping is a typical way to deal with order malware dependent on their dismantled codes. The quantity of simple highlights for length N is CN, where C is the size of guidance set. Plainly a huge increment in N will bring about element blast. Also, diminishing the size of highlight builds heartiness and adequacy of discovery on the grounds that insufficient highlights will influence execution of the AI approach.

Merits

  • The decisions made in picking the recognition strategy can decided the unwavering quality and viability of the Android malware discovery framework.
  • By utilizing this methodology the malevolent application can be immediately recognized and ready to keep the vindictive application from being introduced in the gadget.
  • Hence, by taking focal points of low bogus positive pace of abuse finder and the capacity of oddity locator to distinguish zero-day malware, a half breed malware discovery technique is proposed in this paper, which is the curiosity in this paper.

Results

IoT, particularly IoBT, will be increasingly important in the foreseeable future. No malware detection solution will be foolproof but we can be certain of the constant race between cyber attackers and cyber defenders. Thus, it is important that we maintain persistent pressure on threat actors.In this paper, we presented an IoT and IoBT malware detection approach based on class-wise selection of Op- Codes sequence as a feature for classification task. A graph of selected features was created for each sample and a deep Eigenspace learning approach was used for malware classification. Our evaluations demonstrated the robustness of our approach in malware detection with an accuracy rate of 98.37% and a precision rate of 98.59%, as well as the capability to mitigate junk code insertion attacks.

Updated: Feb 16, 2024
Cite this page

Enhancing IoT Device Security: N-Gram Sequence Algorithm for Malware Detection. (2024, Feb 16). Retrieved from https://studymoose.com/document/enhancing-iot-device-security-n-gram-sequence-algorithm-for-malware-detection

Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment