Cited 0 time in
IoT Malware Dynamic Analysis Scheme Using the CNN Model
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeon, J. | - |
| dc.contributor.author | Baek, S. | - |
| dc.contributor.author | Kim, M. | - |
| dc.contributor.author | Go, I. | - |
| dc.contributor.author | Jeong, Y.-S. | - |
| dc.date.accessioned | 2023-04-27T19:40:52Z | - |
| dc.date.available | 2023-04-27T19:40:52Z | - |
| dc.date.issued | 2021 | - |
| dc.identifier.issn | 1876-1100 | - |
| dc.identifier.issn | 1876-1119 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/5576 | - |
| dc.description.abstract | Recently, Internet of Things (IoT) technologies have been fused with next-generation technologies such as 5G and deep learning and used in diverse fields such as smart homes, smart cars, and smart appliances. As the demand for IoT devices increases, security threats targeting IoT devices, IoT infrastructure, and IoT application programs have also been increasing. Diverse studies on IoT malware detection have been conducted to protect IoT devices particularly from IoT malware among the security threats. However, existing studies can only accurately detect known IoT malware, not new and variant IoT malware. In this study, the malware dynamic analysis (MALDA) scheme that accurately detects new and variant malware that threatens IoT devices quickly is proposed to reduce the damage caused to IoT devices. The MALDA scheme dynamically analyzes IoT malware in nested cloud environments by training the behavioral features of IoT malware based on the Convolutional Neural Network (CNN) model. © 2021, Springer Nature Singapore Pte Ltd. | - |
| dc.format.extent | 7 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | - |
| dc.title | IoT Malware Dynamic Analysis Scheme Using the CNN Model | - |
| dc.type | Article | - |
| dc.publisher.location | 독일 | - |
| dc.identifier.doi | 10.1007/978-981-15-9343-7_77 | - |
| dc.identifier.scopusid | 2-s2.0-85101547372 | - |
| dc.identifier.bibliographicCitation | Lecture Notes in Electrical Engineering, v.715, pp 547 - 553 | - |
| dc.citation.title | Lecture Notes in Electrical Engineering | - |
| dc.citation.volume | 715 | - |
| dc.citation.startPage | 547 | - |
| dc.citation.endPage | 553 | - |
| dc.type.docType | Conference Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Dynamic analysis | - |
| dc.subject.keywordAuthor | Internet of things | - |
| dc.subject.keywordAuthor | Malware | - |
| dc.subject.keywordAuthor | Malware detection | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
