Cited 169 time in
Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeon, Jueun | - |
| dc.contributor.author | Park, Jong Hyuk | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.date.accessioned | 2024-08-08T06:01:24Z | - |
| dc.date.available | 2024-08-08T06:01:24Z | - |
| dc.date.issued | 2020 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/18733 | - |
| dc.description.abstract | Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are connected and exchange information through the Internet. IoT technology is fused with 5G and artificial intelligence (AI) technologies for use various fields such as the smart city and smart factory. As the demand for IoT technology increases, security threats against IoT infrastructure, applications, and devices have also increased. A variety of studies have been conducted on the detection of IoT malware to avoid the threats posed by malicious code. While existing models may accurately detect malicious IoT code identified through static analysis, detecting the new and variant IoT malware quickly being generated may become challenging. This paper proposes a dynamic analysis for IoT malware detection (DAIMD) to reduce damage to IoT devices by detecting both well-known IoT malware and new and variant IoT malware evolved intelligently. The DAIMD scheme learns IoT malware using the convolution neural network (CNN) model and analyzes IoT malware dynamically in nested cloud environment. DAIMD performs dynamic analysis on IoT malware in a nested cloud environment to extract behaviors related to memory, network, virtual file system, process, and system call. By converting the extracted and analyzed behavior data into images, the behavior images of IoT malware are classified and trained in the Convolution Neural Network (CNN). DAIMD can minimize the infection damage of IoT devices from malware by visualizing and learning the vast amount of behavior data generated through dynamic analysis. | - |
| dc.format.extent | 13 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
| dc.title | Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ACCESS.2020.2995887 | - |
| dc.identifier.scopusid | 2-s2.0-85086067045 | - |
| dc.identifier.wosid | 000541139500144 | - |
| dc.identifier.bibliographicCitation | IEEE ACCESS, v.8, pp 96899 - 96911 | - |
| dc.citation.title | IEEE ACCESS | - |
| dc.citation.volume | 8 | - |
| dc.citation.startPage | 96899 | - |
| dc.citation.endPage | 96911 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | ARCHITECTURE | - |
| dc.subject.keywordPlus | INTERNET | - |
| dc.subject.keywordPlus | THREATS | - |
| dc.subject.keywordAuthor | Malware | - |
| dc.subject.keywordAuthor | Feature extraction | - |
| dc.subject.keywordAuthor | Data visualization | - |
| dc.subject.keywordAuthor | Cloud computing | - |
| dc.subject.keywordAuthor | Static analysis | - |
| dc.subject.keywordAuthor | Convolution | - |
| dc.subject.keywordAuthor | Neural networks | - |
| dc.subject.keywordAuthor | Cloud-based malware detection | - |
| dc.subject.keywordAuthor | convolution neural network | - |
| dc.subject.keywordAuthor | dynamic analysis | - |
| dc.subject.keywordAuthor | IoT malware | - |
| dc.subject.keywordAuthor | malware detection | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
