2022
DOI: 10.34028/iajit/19/2/13
|View full text |Cite
|
Sign up to set email alerts
|

Multichannel Based IoT Malware Detection System Using System Calls and Opcode Sequences

Abstract: The rapid development in the field of the Internet of things gives rise to many malicious attacks, since it holds many smart objects whose lack of an efficient security framework. These kinds of security issues bring the entire halt-down situation to all smart objects that are connected to the network. In this work, multichannel Convolutional Neural Network (CNN) is proposed whereas each channel’s CNN works on each type of input parameter. This model has two channels connected in a parallel manner, with one CN… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…(a) Unusual or high-volume network traffic [10], as well as traffic from unknown sources, ports, or protocols, are just some of the indicators that were uncovered by ML models monitoring network activity. (b) System calls are used by malware to communicate with the operating system and were a telltale sign of malicious software [11]. Models trained with ML were very vigilant on system calls for signs of malicious activity.…”
Section: The Role Of Machine Learning In Ransomware Defensementioning
confidence: 99%
“…(a) Unusual or high-volume network traffic [10], as well as traffic from unknown sources, ports, or protocols, are just some of the indicators that were uncovered by ML models monitoring network activity. (b) System calls are used by malware to communicate with the operating system and were a telltale sign of malicious software [11]. Models trained with ML were very vigilant on system calls for signs of malicious activity.…”
Section: The Role Of Machine Learning In Ransomware Defensementioning
confidence: 99%
“…These drawbacks are caused by the emulation, which adds a significant performance penalty. In this work, employing the SHA-256 algorithm aids efficiently and effectively in rootkit detection in a virtual system [4]. Analysing each hashing algorithm's unique characteristics and the needs of the use case is essential when choosing one, such as message diggest 5 (MD5) and SHA-256.…”
Section: Introductionmentioning
confidence: 99%