Back to Search Start Over

An opcode‐based technique for polymorphic Internet of Things malware detection.

Authors :
Darabian, Hamid
Dehghantanha, Ali
Hashemi, Sattar
Homayoun, Sajad
Choo, Kim‐Kwang Raymond
Source :
Concurrency & Computation: Practice & Experience; 3/25/2020, Vol. 32 Issue 6, pN.PAG-N.PAG, 1p
Publication Year :
2020

Abstract

Summary: The increasing popularity of Internet of Things (IoT) devices makes them an attractive target for malware authors. In this paper, we use sequential pattern mining technique to detect most frequent opcode sequences of malicious IoT applications. Detected maximal frequent patterns (MFP) of opcode sequences can be used to differentiate malicious from benign IoT applications. We then evaluate the suitability of MFPs as a classification feature for K nearest neighbors (KNN), support vector machines (SVM), multilayer perceptron (MLP), AdaBoost, decision tree, and random forest classifier. Specifically, we achieve an accuracy rate of 99% in the detection of unseen IoT malware. We also demonstrate the utility of our approach in detecting polymorphed IoT malware samples. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15320626
Volume :
32
Issue :
6
Database :
Complementary Index
Journal :
Concurrency & Computation: Practice & Experience
Publication Type :
Academic Journal
Accession number :
141720535
Full Text :
https://doi.org/10.1002/cpe.5173