Back to Search
Start Over
An opcode‐based technique for polymorphic Internet of Things malware detection.
- Source :
- Concurrency & Computation: Practice & Experience; 3/25/2020, Vol. 32 Issue 6, pN.PAG-N.PAG, 1p
- Publication Year :
- 2020
-
Abstract
- Summary: The increasing popularity of Internet of Things (IoT) devices makes them an attractive target for malware authors. In this paper, we use sequential pattern mining technique to detect most frequent opcode sequences of malicious IoT applications. Detected maximal frequent patterns (MFP) of opcode sequences can be used to differentiate malicious from benign IoT applications. We then evaluate the suitability of MFPs as a classification feature for K nearest neighbors (KNN), support vector machines (SVM), multilayer perceptron (MLP), AdaBoost, decision tree, and random forest classifier. Specifically, we achieve an accuracy rate of 99% in the detection of unseen IoT malware. We also demonstrate the utility of our approach in detecting polymorphed IoT malware samples. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 15320626
- Volume :
- 32
- Issue :
- 6
- Database :
- Complementary Index
- Journal :
- Concurrency & Computation: Practice & Experience
- Publication Type :
- Academic Journal
- Accession number :
- 141720535
- Full Text :
- https://doi.org/10.1002/cpe.5173