Cargando…
IoT malware detection architecture using a novel channel boosted and squeezed CNN
Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of smart devices to constitute a network introduces many security challenges. These connected devices have created a security blind spot, where cy...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9477830/ https://www.ncbi.nlm.nih.gov/pubmed/36109570 http://dx.doi.org/10.1038/s41598-022-18936-9 |
_version_ | 1784790448441655296 |
---|---|
author | Asam, Muhammad Khan, Saddam Hussain Akbar, Altaf Bibi, Sameena Jamal, Tauseef Khan, Asifullah Ghafoor, Usman Bhutta, Muhammad Raheel |
author_facet | Asam, Muhammad Khan, Saddam Hussain Akbar, Altaf Bibi, Sameena Jamal, Tauseef Khan, Asifullah Ghafoor, Usman Bhutta, Muhammad Raheel |
author_sort | Asam, Muhammad |
collection | PubMed |
description | Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of smart devices to constitute a network introduces many security challenges. These connected devices have created a security blind spot, where cybercriminals can easily launch attacks to compromise the devices using malware proliferation techniques. Therefore, malware detection is a lifeline for securing IoT devices against cyberattacks. This study addresses the challenge of malware detection in IoT devices by proposing a new CNN-based IoT malware detection architecture (iMDA). The proposed iMDA is modular in design that incorporates multiple feature learning schemes in blocks including (1) edge exploration and smoothing, (2) multi-path dilated convolutional operations, and (3) channel squeezing and boosting in CNN to learn a diverse set of features. The local structural variations within malware classes are learned by Edge and smoothing operations implemented in the split-transform-merge (STM) block. The multi-path dilated convolutional operation is used to recognize the global structure of malware patterns. At the same time, channel squeezing and merging helped to regulate complexity and get diverse feature maps. The performance of the proposed iMDA is evaluated on a benchmark IoT dataset and compared with several state-of-the CNN architectures. The proposed iMDA shows promising malware detection capacity by achieving accuracy: 97.93%, F1-Score: 0.9394, precision: 0.9864, MCC: 0. 8796, recall: 0.8873, AUC-PR: 0.9689 and AUC-ROC: 0.9938. The strong discrimination capacity suggests that iMDA may be extended for the android-based malware detection and IoT Elf files compositely in the future. |
format | Online Article Text |
id | pubmed-9477830 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-94778302022-09-17 IoT malware detection architecture using a novel channel boosted and squeezed CNN Asam, Muhammad Khan, Saddam Hussain Akbar, Altaf Bibi, Sameena Jamal, Tauseef Khan, Asifullah Ghafoor, Usman Bhutta, Muhammad Raheel Sci Rep Article Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of smart devices to constitute a network introduces many security challenges. These connected devices have created a security blind spot, where cybercriminals can easily launch attacks to compromise the devices using malware proliferation techniques. Therefore, malware detection is a lifeline for securing IoT devices against cyberattacks. This study addresses the challenge of malware detection in IoT devices by proposing a new CNN-based IoT malware detection architecture (iMDA). The proposed iMDA is modular in design that incorporates multiple feature learning schemes in blocks including (1) edge exploration and smoothing, (2) multi-path dilated convolutional operations, and (3) channel squeezing and boosting in CNN to learn a diverse set of features. The local structural variations within malware classes are learned by Edge and smoothing operations implemented in the split-transform-merge (STM) block. The multi-path dilated convolutional operation is used to recognize the global structure of malware patterns. At the same time, channel squeezing and merging helped to regulate complexity and get diverse feature maps. The performance of the proposed iMDA is evaluated on a benchmark IoT dataset and compared with several state-of-the CNN architectures. The proposed iMDA shows promising malware detection capacity by achieving accuracy: 97.93%, F1-Score: 0.9394, precision: 0.9864, MCC: 0. 8796, recall: 0.8873, AUC-PR: 0.9689 and AUC-ROC: 0.9938. The strong discrimination capacity suggests that iMDA may be extended for the android-based malware detection and IoT Elf files compositely in the future. Nature Publishing Group UK 2022-09-15 /pmc/articles/PMC9477830/ /pubmed/36109570 http://dx.doi.org/10.1038/s41598-022-18936-9 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Asam, Muhammad Khan, Saddam Hussain Akbar, Altaf Bibi, Sameena Jamal, Tauseef Khan, Asifullah Ghafoor, Usman Bhutta, Muhammad Raheel IoT malware detection architecture using a novel channel boosted and squeezed CNN |
title | IoT malware detection architecture using a novel channel boosted and squeezed CNN |
title_full | IoT malware detection architecture using a novel channel boosted and squeezed CNN |
title_fullStr | IoT malware detection architecture using a novel channel boosted and squeezed CNN |
title_full_unstemmed | IoT malware detection architecture using a novel channel boosted and squeezed CNN |
title_short | IoT malware detection architecture using a novel channel boosted and squeezed CNN |
title_sort | iot malware detection architecture using a novel channel boosted and squeezed cnn |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9477830/ https://www.ncbi.nlm.nih.gov/pubmed/36109570 http://dx.doi.org/10.1038/s41598-022-18936-9 |
work_keys_str_mv | AT asammuhammad iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn AT khansaddamhussain iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn AT akbaraltaf iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn AT bibisameena iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn AT jamaltauseef iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn AT khanasifullah iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn AT ghafoorusman iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn AT bhuttamuhammadraheel iotmalwaredetectionarchitectureusinganovelchannelboostedandsqueezedcnn |