2022
DOI: 10.1007/s10207-022-00602-w
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent and behavioral-based detection of malware in IoT spectrum sensors

Abstract: The number of Cyber-Physical Systems (CPS) available in industrial environments is growing mainly due to the evolution of the Internet-of-Things (IoT) paradigm. In such a context, radio frequency spectrum sensing in industrial scenarios is one of the most interesting applications of CPS due to the scarcity of the spectrum. Despite the benefits of operational platforms, IoT spectrum sensors are vulnerable to heterogeneous malware. The usage of behavioral fingerprinting and machine learning has shown merit in de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…Behavioral analysis is a crucial approach in malware analysis and detection, focusing on how malware behaves when executed in a controlled environment [56][57][58][59]. This technique observes the dynamic actions and interactions of malware with the host system and network, allowing for the detection of malicious behavior that may not be evident through static analysis alone.…”
Section: Behavioral Analysis Toolsmentioning
confidence: 99%
“…Behavioral analysis is a crucial approach in malware analysis and detection, focusing on how malware behaves when executed in a controlled environment [56][57][58][59]. This technique observes the dynamic actions and interactions of malware with the host system and network, allowing for the detection of malicious behavior that may not be evident through static analysis alone.…”
Section: Behavioral Analysis Toolsmentioning
confidence: 99%
“…Celdrán and Moon, in their respective works [20,21], present an evaluation of the impact of various techniques such as hash-coded string extraction, file format analysis, file fingerprinting, packer detection, and disassembly on the efficacy of static and dynamic analysis. The primary objective of this analysis was to yield two critical advantages.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Using similar hash mapping techniques, we reviewed and analysed tra c from additional les and classi ed it as benign or harmful. Hash buckets are collections of les with comparable hash values [19]. If a le is classed within a pure malware bucket area, we identify it as malware.…”
Section: Classi Cation and Predictionmentioning
confidence: 99%