Cited 65 time in
Two-Stage Hybrid Malware Detection Using Deep Learning
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Baek, Seungyeon | - |
| dc.contributor.author | Jeon, Jueun | - |
| dc.contributor.author | Jeong, Byeonghui | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.date.accessioned | 2024-08-08T05:31:31Z | - |
| dc.date.available | 2024-08-08T05:31:31Z | - |
| dc.date.issued | 2021-06-30 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/18710 | - |
| dc.description.abstract | With the increasing number and variety of Internet of Things (IoT) devices supporting a wide range of services such as smart homes, smart transportation, and smart factories in smart cities, malware carrying various cybersecurity threats are rapidly increasing in terms of type and number. To protect IoT devices from cyberattacks, studies on malware detection using artificial intelligence are being conducted. However, with the emergence of IoT malware and their various evasion techniques, the probability of falsely detecting malware as benign is also increasing. In this study, we propose a two-stage hybrid malware detection (2MaD) scheme for the protection of IoT devices from obfuscated malware in a smart city setting. The 2-MaD consists of two stages of IoT malware detection. First, after performing static analysis, the opcode is extracted, and using the learned information through a bidirectional long short-term memory model, benign files are detected. In the next stage, a dynamic analysis is performed on files classified as benign in a nested virtual environment. After extracting information on behavior and process memory from the behavior log based on system changes, malware can be detected through the trained EfficientNet-B3 model. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | KOREA INFORMATION PROCESSING SOC | - |
| dc.title | Two-Stage Hybrid Malware Detection Using Deep Learning | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.22967/HCIS.2021.11.027 | - |
| dc.identifier.scopusid | 2-s2.0-85120851398 | - |
| dc.identifier.wosid | 000680829200001 | - |
| dc.identifier.bibliographicCitation | HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, v.11 | - |
| dc.citation.title | HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES | - |
| dc.citation.volume | 11 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.subject.keywordPlus | DETECTION SYSTEM | - |
| dc.subject.keywordAuthor | Malware Detection | - |
| dc.subject.keywordAuthor | Hybrid Analysis | - |
| dc.subject.keywordAuthor | Internet of Things | - |
| dc.subject.keywordAuthor | Deep Learning | - |
| dc.subject.keywordAuthor | Bi-LSTM | - |
| dc.subject.keywordAuthor | CNN | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
