Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A new deep boosted CNN and ensemble learning based IoT malware detection

Published: 01 October 2023 Publication History

Highlights

New two-phase CNN-based diagnostic system detects and analyzes COVID-19 infection.
New SB-STM-BRNet detection CNN comprised a new dilated convolutional STM block and SB.
Prominent and diverse channels are achieved using STM blocks and TL to learn infection.
Novel CB-based COVID-CB-RESeg precisely demarcates the COVID-19 contagious region.
CB employs region homogeneity and heterogeneity to learn contrast and texture patterns.

Abstract

Security issues are threatened in various types of networks, especially in the Internet of Things (IoT) environment that requires early detection. IoT is the network of real-time devices like home automation systems and can be controlled by open-source android devices, which can be an open ground for attackers. Attackers can access the network credentials, initiate a different kind of security breach, and compromises network control. Therefore, timely detecting the increasing number of sophisticated malware attacks is the challenge to ensure the credibility of network protection. In this regard, we have developed a new malware detection framework, Deep Squeezed-Boosted and Ensemble Learning (DSBEL), comprised of novel Squeezed-Boosted Boundary-Region Split-Transform-Merge (SB-BR-STM) CNN and ensemble learning. The proposed STM block employs multi-path dilated convolutional, Boundary, and regional operations to capture the homogenous and heterogeneous global malicious patterns. Moreover, diverse feature maps are achieved using transfer learning and multi-path-based squeezing and boosting at initial and final levels to learn minute pattern variations. Finally, the boosted discriminative features are extracted from the developed deep SB-BR-STM CNN and provided to the ensemble classifiers (SVM, MLP, and AdabooSTM1) to improve the hybrid learning generalization. The performance analysis of the proposed DSBEL framework and SB-BR-STM CNN against the existing techniques have been evaluated by the IOT_Malware dataset on standard performance measures. Evaluation results show progressive performance as 98.50% accuracy, 97.12% F1-Score, 91.91% MCC, 95.97 % Recall, and 98.42 % Precision. The proposed malware analysis framework is robust and helpful for the timely detection of malicious activity and suggests future strategies.

Graphical abstract

Display Omitted

References

[1]
S Madakam, R Ramaswamy, S. Tripathi, Internet of Things (IoT): a literature review, J. Comput. Commun. 03 (2015) 164–173,.
[2]
MC Vuran, A Salam, R Wong, S. Irmak, Internet of underground things in precision agriculture: architecture and technology aspects, Ad Hoc Netw. 81 (2018) 160–173,.
[3]
MM Zafar, Z Rauf, A Sohail, AR Khan, M Obaidullah, SH Khan, et al., Detection of tumour infiltrating lymphocytes in CD3 and CD8 stained histopathological images using a two-phase deep CNN, Photodiagnosis Photodyn. Ther. 37 (2022),.
[4]
Riazul Islam SM, Daehan Kwak, Humaun Kabir M, M Hossain, Kyung-Sup Kwak, The Internet of Things for health care: a comprehensive survey, IEEE Access 3 (2015) 678–708,.
[5]
MM Zahoor, SA Qureshi, S Bibi, SH Khan, A Khan, U Ghafoor, et al., A new deep hybrid boosted and ensemble learning-based brain tumor analysis using MRI, Sensors 22 (2022) 2726,.
[6]
Khan SH. COVID-19 Detection and Analysis From Lung CT Images using Novel Channel Boosted CNNs 2022. 2209.10963.
[7]
A Khan, SH Khan, M Saif, A Batool, A Sohail, M Waleed Khan, A survey of deep learning techniques for the analysis of COVID-19 and their usability for detecting omicron, J. Exp. Theor. Artif. Intell. (2023) 1–43,.
[8]
Z Rauf, A Sohail, SH Khan, A Khan, J Gwak, M. Maqbool, Attention-guided multi-scale deep object detection framework for lymphocyte analysis in IHC histological images, Microscopy 72 (2023) 27–42,.
[9]
B Iyer, N. Patil, IoT enabled tracking and monitoring sensor for military applications, Int. J. Syst. Assur. Eng. Manag. 9 (2018) 1294–1301,.
[10]
S Qamar, SH Khan, MA Arshad, M Qamar, J Gwak, A. Khan, Autonomous drone swarm navigation and multitarget tracking with island policy-based optimization framework, IEEE Access 10 (2022) 91073–91091,.
[11]
MA Arshad, SH Khan, S Qamar, MW Khan, I Murtza, J Gwak, et al., Drone navigation using region and edge exploitation-based deep CNN, IEEE Access 10 (2022) 95441–95450,.
[12]
Zahoor MM, Khan SH. Brain tumor MRI classification using a novel deep residual and regional CNN 2022. 2211.16571v2.
[13]
IF Mikhalevich, VA. Trapeznikov, Critical infrastructure security: alignment of views, in: 2019 Systems of Signals Generating and Processing in the Field of on Board Communications, IEEE, 2019, pp. 1–5,.
[14]
B Vignau, R Khoury, S Hallé, A. Hamou-Lhadj, The evolution of IoT Malwares, from 2008 to 2019: survey, taxonomy, process simulator and perspectives, J. Syst. Archit. 116 (2021),.
[15]
R Chaganti, V Ravi, TD. Pham, Deep learning based cross architecture internet of things malware detection and classification, Comput. Secur. 120 (2022),.
[16]
U Zahoora, A Khan, M Rajarajan, SH Khan, M Asam, T. Jamal, Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier, Sci. Rep. 12 (2022) 15647,.
[17]
Q-D Ngo, H-T Nguyen, V-H Le, D-H. Nguyen, A survey of IoT malware and detection methods based on static features, ICT Express 6 (2020) 280–286,.
[18]
M Asam, SJ Hussain, M Mohatram, SH Khan, T Jamal, A Zafar, et al., Detection of exceptional malware variants using deep boosted feature spaces and machine learning, Appl. Sci. 11 (2021),.
[19]
M Asam, SH Khan, A Akbar, S Bibi, T Jamal, A Khan, et al., IoT malware detection architecture using a novel channel boosted and squeezed CNN, Sci. Rep. 12 (2022) 15498,.
[20]
V R, K.P.S. DeepMalNet, Evaluating shallow and deep networks for static PE malware detection, ICT Express 4 (2018) 255–258,.
[21]
R Vinayakumar, M Alazab, KP Soman, P Poornachandran, S. Venkatraman, Robust intelligent malware detection using deep learning, IEEE Access 7 (2019) 46717–46738,.
[22]
Shalaginov A, Øverlier L. A novel study on multinomial classification of x86/x64 Linux ELF malware types and families through deep neural networks. Malware Anal. Using Artif. Intell. Deep Learn., Cham: Springer International Publishing; 2021, p. 437–53. 10.1007/978-3-030-62582-5_17.
[23]
G Bendiab, S Shiaeles, A Alruban, N. Kolokotronis, IoT malware network traffic classification using visual representation and deep learning, in: 2020 6th IEEE Conference on. Network Softwarization, Volume 1, IEEE, 2020, pp. 444–449,.
[24]
A Muzaffar, H Ragab Hassen, MA Lones, H Zantout, An in-depth review of machine learning based Android malware detection, Comput. Secur. 121 (2022),.
[25]
H Deng, C Guo, G Shen, Y Cui, Y. Ping, MCTVD: a malware classification method based on three-channel visualization and deep learning, Comput. Secur. 126 (2023),.
[26]
J Su, V Danilo Vasconcellos, S Prasad, S Daniele, Y Feng, K Sakurai, Lightweight classification of IoT malware based on image recognition, in: 2018 IEEE 42nd Annual Computer Software and Applications Conference, IEEE, 2018, pp. 664–669,.
[27]
Z Ren, H Wu, Q Ning, I Hussain, B. Chen, End-to-end malware detection for android IoT devices using deep learning, Ad Hoc Netw. 101 (2020),.
[28]
Hussain SJ, Ahmed U, Liaquat H, Mir S, Jhanjhi N, Humayun M. IMIAD: intelligent malware identification for android platform. 2019 Int. Conf. Comput. Inf. Sci., IEEE; 2019, p. 1–6. 10.1109/ICCISci.2019.8716471.
[29]
M Shafiq, Z Tian, AK Bashir, X Du, M. Guizani, CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques, IEEE Internet Things J 8 (2021) 3242–3254,.
[30]
Zhang Y, Yang Y, Wang X. A novel android malware detection approach based on convolutional neural network. Proc. 2nd Int. Conf. Cryptogr. Secur. Priv., New York, NY, USA: ACM; 2018, p. 144–9. 10.1145/3199478.3199492.
[31]
K Xu, Y Li, RH Deng, K Chen, DeepRefiner: multi-layer android malware detection system applying deep neural networks, in: 2018 IEEE European Symposium on Security and Privacy, IEEE, 2018, pp. 473–487,.
[32]
MK Alzaylaee, SY Yerima, Sezer S. DL-Droid, Deep learning based android malware detection using real devices, Comput. Secur. 89 (2020),.
[33]
Y Ye, T Li, D Adjeroh, SS. Iyengar, A survey on malware detection using data mining techniques, ACM Comput. Surv. 50 (2018) 1–40,.
[34]
E Cozzi, M Graziano, Y Fratantonio, D. Balzarotti, Understanding Linux malware, in: 2018 IEEE Symposium on Security and Privacy, IEEE, 2018, pp. 161–175,.
[35]
TG Palla, S. Tayeb, Intelligent mirai malware detection in IoT devices, in: 2021 IEEE World AI IoT Congress, IEEE, 2021, pp. 0420–0426,.
[36]
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C. Rossow, IoTPOT: a novel honeypot for revealing current IoT threats, J. Inf. Process. 24 (2016) 522–533,.
[37]
SA Khowaja, P. Khuwaja, Q-learning and LSTM based deep active learning strategy for malware defense in industrial IoT applications, Multimed. Tools Appl. 80 (2021) 14637–14663,.
[38]
H Naeem, F Ullah, MR Naeem, S Khalid, D Vasan, S Jabbar, et al., Malware detection in industrial internet of things based on hybrid image visualization and deep learning model, Ad Hoc Netw. 105 (2020),.
[39]
G M, SC Sethuraman, A comprehensive survey on deep learning based malware detection techniques, Comput. Sci. Rev. 47 (2023),.
[40]
C Shorten, TM. Khoshgoftaar, A survey on image data augmentation for deep learning, J. Big Data 6 (2019) 1–48,.
[41]
SH Khan, NS Shah, R Nuzhat, A Majid, H Alquhayz, A. Khan, Malaria parasite classification framework using a novel channel squeezed and boosted CNN, Microscopy 71 (2022) 271–282,.
[42]
SH Khan, A Khan, YS Lee, M Hassan, WK. Jeong, Segmentation of shoulder muscle MRI using a new region and edge based deep auto-encoder, Multimed. Tools Appl. (2022),.
[43]
M. Gardner, S. Dorling, Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences, Atmos. Environ. 32 (1998) 2627–2636,.
[44]
Schapire RE. Explaining adaboost. Empir Inference Festschrift Honor Vladimir N Vapnik 2013:37–52. 10.1007/978-3-642-41136-6_5/COVER.
[45]
R Mahmood, N Mirzaei, S. Malek, EvoDroid: segmented evolutionary testing of Android apps, in: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, New York, NY, USA: ACM, 2014, pp. 599–609,.
[46]
Vidas T, Tan J, Nahata J, Tan CL, Christin N, Tague P. A5 automated analysis of adversarial android applications. Proc. 4th ACM Work. Secur. Priv. Smartphones Mob. Devices, New York, NY, USA: ACM; 2014, p. 39–50. 10.1145/2666620.2666630.
[47]
A Khan, A Sohail, U Zahoora, AS. Qureshi, A survey of the recent architectures of deep convolutional neural networks, Artif. Intell. Rev. (2020) 1–68,.
[48]
T-L Wan, T Ban, Y-T Lee, S-M Cheng, R Isawa, T Takahashi, et al., IoT-malware detection based on byte sequences of executable files, in: 2020 15th Asia Joint Conference on Information Security, IEEE, 2020, pp. 143–150. 10.1109/AsiaJCIS50894.2020.00033.
[49]
I Almomani, A Alkhayer, W. El-Shafai, An automated vision-based deep learning model for efficient detection of android malware attacks, IEEE Access 10 (2022) 2700–2720,.
[50]
K. Hajian-Tilaki, Receiver operating characteristic (ROC) curve analysis for medical diagnostic test evaluation, Casp. J. Intern. Med. 4 (2013) 627–635.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computers and Security
Computers and Security  Volume 133, Issue C
Oct 2023
350 pages

Publisher

Elsevier Advanced Technology Publications

United Kingdom

Publication History

Published: 01 October 2023

Author Tags

  1. Malware
  2. IoT
  3. Ensemble learning
  4. Deep learning
  5. CNN
  6. Detection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media