2021
DOI: 10.48084/etasr.4412
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Learning Approach for Malware and Software Piracy Threat Detection

Abstract: Internet of Things (IoT) -based systems need to be up to date on cybersecurity threats. The security of IoT networks is challenged by software piracy and malware attacks, and much important information can be stolen and used for cybercrimes. This paper attempts to improve IoT cybersecurity by proposing a combined model based on deep learning to detect malware and software piracy across the IoT network. The malware’s model is based on Deep Convolutional Neural Networks (DCNNs). Apart from this, TensorFlow Deep … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…Model Accuracy, Precision, Recall, F1 score metrics were used for model evaluations. Recall, F1 score, Precision, Accuracy can be mathematically computed by using the equations from Table V [11,28]. True Positive (TP) occurs when the values of both predicted class and actual class are 1.…”
Section: ) Model Evaluation Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Model Accuracy, Precision, Recall, F1 score metrics were used for model evaluations. Recall, F1 score, Precision, Accuracy can be mathematically computed by using the equations from Table V [11,28]. True Positive (TP) occurs when the values of both predicted class and actual class are 1.…”
Section: ) Model Evaluation Metricsmentioning
confidence: 99%
“…Monitoring data traffic in connected devices provides useful information that would be of importance in the timely understanding of the behavior of the flows and in predicting bandwidth usage. Monitoring data flows is crucial in that, any Denial of Service attacks (DoS) and other network security threats and vulnerabilities within the network can be easily identified for timely interventions [5,[10][11][12]. It helps system administrators and security experts to understand and monitor all activities in the given computer network.…”
Section: Introductionmentioning
confidence: 99%
“…In [6], static and dynamic artifacts were utilized to classify Android applications and address the challenge of ransomware, surpassing the existing solutions. Meanwhile, other studies' proposed models and methods ranging from system permission features to ensemble ML approaches, achieving accuracies between 94% and 99% [7][8][9][10][11][12]. Despite their effectiveness, some approaches, such as the Ensemble Deep Restricted Boltzmann Machine [13], demonstrated accuracy below 80%.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, Convolutional Neural Networks (CNNs) are utilized to classify biomedical images. CNN works very well with huge datasets and is less precise on small datasets [10]. In small datasets, pretrained CNNs are usually utilized.…”
Section: Introductionmentioning
confidence: 99%