Cited 48 time in
Hybrid Malware Detection Based on Bi-LSTM and SPP-Net for Smart IoT
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeon, Jueun | - |
| dc.contributor.author | Jeong, Byeonghui | - |
| dc.contributor.author | Baek, Seungyeon | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.date.accessioned | 2023-04-27T10:40:55Z | - |
| dc.date.available | 2023-04-27T10:40:55Z | - |
| dc.date.issued | 2022-07 | - |
| dc.identifier.issn | 1551-3203 | - |
| dc.identifier.issn | 1941-0050 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/2928 | - |
| dc.description.abstract | In this article, we propose the hybrid malware detection scheme, HyMalD, with bidirectional long short-term memory (Bi-LSTM) and the spatial pyramid pooling network (SPP-Net). Its purpose is to protect Internet of Things (IoT) devices and minimize the damage caused by infection through obfuscated malware. HyMalD performs the static and dynamic analyses logically simultaneously to detect obfuscated malware, which is impossible to do using static analysis alone. First, it extracts static features of the opcode sequence using a reconstructed dataset according to the obfuscation and extracts the application programming interface (API) call sequence dynamically. The extracted features are trained through the Bi-LSTM and SPP-Net models, which HyMalD uses to detect and classify IoT malware. The performance of HyMalD was evaluated, and its detection accuracy was 92.5%. The false-negative rate (FNR) of HyMalD was 7.67%. Thus, HyMalD detects IoT malware more accurately and with a lower FNR than in the static analysis, which had 92.09% detection accuracy and 9.97% FNR. | - |
| dc.format.extent | 8 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEEE | - |
| dc.title | Hybrid Malware Detection Based on Bi-LSTM and SPP-Net for Smart IoT | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/TII.2021.3119778 | - |
| dc.identifier.scopusid | 2-s2.0-85117809427 | - |
| dc.identifier.wosid | 000784218500053 | - |
| dc.identifier.bibliographicCitation | IEEE Transactions on Industrial Informatics, v.18, no.7, pp 4830 - 4837 | - |
| dc.citation.title | IEEE Transactions on Industrial Informatics | - |
| dc.citation.volume | 18 | - |
| dc.citation.number | 7 | - |
| dc.citation.startPage | 4830 | - |
| dc.citation.endPage | 4837 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Automation & Control Systems | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalWebOfScienceCategory | Automation & Control Systems | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Industrial | - |
| dc.subject.keywordPlus | ANDROID MALWARE | - |
| dc.subject.keywordPlus | NETWORKS | - |
| dc.subject.keywordPlus | FUSION | - |
| dc.subject.keywordAuthor | Malware | - |
| dc.subject.keywordAuthor | Feature extraction | - |
| dc.subject.keywordAuthor | Analytical models | - |
| dc.subject.keywordAuthor | Static analysis | - |
| dc.subject.keywordAuthor | Entropy | - |
| dc.subject.keywordAuthor | Internet of Things | - |
| dc.subject.keywordAuthor | Performance evaluation | - |
| dc.subject.keywordAuthor | Bidirectional long short-term memory (Bi-LSTM) | - |
| dc.subject.keywordAuthor | hybrid malware detection | - |
| dc.subject.keywordAuthor | Internet of Things (IoT) malware | - |
| dc.subject.keywordAuthor | Shannon entropy | - |
| dc.subject.keywordAuthor | spatial pyramid pooling network (SPP-Net) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
