2022
DOI: 10.1016/j.cose.2022.102779
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning based cross architecture internet of things malware detection and classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…The static analysis methods that use strings [ 7 , 13 , 14 , 15 , 16 , 17 ] and byte sequences [ 18 , 19 , 20 ] as features extract a large number of unique features, imposing a computationally intensive and time-consuming detection process. However, reducing the number of features through preprocessing discards valuable data.…”
Section: Related Workmentioning
confidence: 99%
“…The static analysis methods that use strings [ 7 , 13 , 14 , 15 , 16 , 17 ] and byte sequences [ 18 , 19 , 20 ] as features extract a large number of unique features, imposing a computationally intensive and time-consuming detection process. However, reducing the number of features through preprocessing discards valuable data.…”
Section: Related Workmentioning
confidence: 99%
“…Deep Learning [22] and [26] Handle complex data-sets, and learn complex relationships between features.…”
Section: Techniquesmentioning
confidence: 99%
“…Researchers have proposed various methods to detect malware to secure IoT devices. Machine learning techniques have gained popularity for malware detection, as they can analyze large datasets of known malware and benign samples to identify patterns for detecting previously unseen malware [21,22]. Numerous studies have proposed and tested machine learning-based approaches, with some focusing on real-time detection and others targeting specific types of IoT malware [23].…”
Section: Introductionmentioning
confidence: 99%
“… Obaidat et al (2022) proposed a CNN model using Java bytecode. Chaganti, Ravi & Pham (2022) developed a Bi-directional DL approach for classifying the IoT malware images. Bensaoud & Kalita (2022) employed Malimg dataset for evaluating the CNN model.…”
Section: Literature Reviewmentioning
confidence: 99%