Cargando…

IoT malware detection architecture using a novel channel boosted and squeezed CNN

Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of smart devices to constitute a network introduces many security challenges. These connected devices have created a security blind spot, where cy...

Descripción completa

Detalles Bibliográficos
Autores principales: Asam, Muhammad, Khan, Saddam Hussain, Akbar, Altaf, Bibi, Sameena, Jamal, Tauseef, Khan, Asifullah, Ghafoor, Usman, Bhutta, Muhammad Raheel
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9477830/
https://www.ncbi.nlm.nih.gov/pubmed/36109570
http://dx.doi.org/10.1038/s41598-022-18936-9
_version_ 1784790448441655296
author Asam, Muhammad
Khan, Saddam Hussain
Akbar, Altaf
Bibi, Sameena
Jamal, Tauseef
Khan, Asifullah
Ghafoor, Usman
Bhutta, Muhammad Raheel
author_facet Asam, Muhammad
Khan, Saddam Hussain
Akbar, Altaf
Bibi, Sameena
Jamal, Tauseef
Khan, Asifullah
Ghafoor, Usman
Bhutta, Muhammad Raheel
author_sort Asam, Muhammad
collection PubMed
description Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of smart devices to constitute a network introduces many security challenges. These connected devices have created a security blind spot, where cybercriminals can easily launch attacks to compromise the devices using malware proliferation techniques. Therefore, malware detection is a lifeline for securing IoT devices against cyberattacks. This study addresses the challenge of malware detection in IoT devices by proposing a new CNN-based IoT malware detection architecture (iMDA). The proposed iMDA is modular in design that incorporates multiple feature learning schemes in blocks including (1) edge exploration and smoothing, (2) multi-path dilated convolutional operations, and (3) channel squeezing and boosting in CNN to learn a diverse set of features. The local structural variations within malware classes are learned by Edge and smoothing operations implemented in the split-transform-merge (STM) block. The multi-path dilated convolutional operation is used to recognize the global structure of malware patterns. At the same time, channel squeezing and merging helped to regulate complexity and get diverse feature maps. The performance of the proposed iMDA is evaluated on a benchmark IoT dataset and compared with several state-of-the CNN architectures. The proposed iMDA shows promising malware detection capacity by achieving accuracy: 97.93%, F1-Score: 0.9394, precision: 0.9864, MCC: 0. 8796, recall: 0.8873, AUC-PR: 0.9689 and AUC-ROC: 0.9938. The strong discrimination capacity suggests that iMDA may be extended for the android-based malware detection and IoT Elf files compositely in the future.
format Online
Article
Text
id pubmed-9477830
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-94778302022-09-17 IoT malware detection architecture using a novel channel boosted and squeezed CNN Asam, Muhammad Khan, Saddam Hussain Akbar, Altaf Bibi, Sameena Jamal, Tauseef Khan, Asifullah Ghafoor, Usman Bhutta, Muhammad Raheel Sci Rep Article Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of smart devices to constitute a network introduces many security challenges. These connected devices have created a security blind spot, where cybercriminals can easily launch attacks to compromise the devices using malware proliferation techniques. Therefore, malware detection is a lifeline for securing IoT devices against cyberattacks. This study addresses the challenge of malware detection in IoT devices by proposing a new CNN-based IoT malware detection architecture (iMDA). The proposed iMDA is modular in design that incorporates multiple feature learning schemes in blocks including (1) edge exploration and smoothing, (2) multi-path dilated convolutional operations, and (3) channel squeezing and boosting in CNN to learn a diverse set of features. The local structural variations within malware classes are learned by Edge and smoothing operations implemented in the split-transform-merge (STM) block. The multi-path dilated convolutional operation is used to recognize the global structure of malware patterns. At the same time, channel squeezing and merging helped to regulate complexity and get diverse feature maps. The performance of the proposed iMDA is evaluated on a benchmark IoT dataset and compared with several state-of-the CNN architectures. The proposed iMDA shows promising malware detection capacity by achieving accuracy: 97.93%, F1-Score: 0.9394, precision: 0.9864, MCC: 0. 8796, recall: 0.8873, AUC-PR: 0.9689 and AUC-ROC: 0.9938. The strong discrimination capacity suggests that iMDA may be extended for the android-based malware detection and IoT Elf files compositely in the future. Nature Publishing Group UK 2022-09-15 /pmc/articles/PMC9477830/ /pubmed/36109570 http://dx.doi.org/10.1038/s41598-022-18936-9 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Asam, Muhammad
Khan, Saddam Hussain
Akbar, Altaf
Bibi, Sameena
Jamal, Tauseef
Khan, Asifullah
Ghafoor, Usman
Bhutta, Muhammad Raheel
IoT malware detection architecture using a novel channel boosted and squeezed CNN
title IoT malware detection architecture using a novel channel boosted and squeezed CNN
title_full IoT malware detection architecture using a novel channel boosted and squeezed CNN
title_fullStr IoT malware detection architecture using a novel channel boosted and squeezed CNN
title_full_unstemmed IoT malware detection architecture using a novel channel boosted and squeezed CNN
title_short IoT malware detection architecture using a novel channel boosted and squeezed CNN
title_sort iot malware detection architecture using a novel channel boosted and squeezed cnn
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9477830/
https://www.ncbi.nlm.nih.gov/pubmed/36109570
http://dx.doi.org/10.1038/s41598-022-18936-9
work_keys_str_mv AT asammuhammad iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn
AT khansaddamhussain iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn
AT akbaraltaf iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn
AT bibisameena iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn
AT jamaltauseef iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn
AT khanasifullah iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn
AT ghafoorusman iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn
AT bhuttamuhammadraheel iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn