Malware detection in industrial internet of things based on hybrid image visualization and deep learning model

Abstract Now the Industrial Internet of Things (IIoT) devices can be deployed to monitor the flow of data, the source of collection and supervision on a large scale of complex networks. It implements large networks for sending and receiving data connected by smart devices. Malware threats, which are primarily targeted at conventional computers linked to the Internet, can also be targeted at IoT machines. Therefore, a smart protection approach is needed to protect millions of IIoT users against malicious attacks. On the other hand, existing state-of - the-art malware identification methods are not better in terms of computational complexity. In this paper, we design architecture to detect malware attacks on the Industrial Internet of Things (MD-IIOT). For an in-depth analysis of malware, a methodology is proposed based on color image visualization and deep convolution neural network. The findings of the proposed method are compared to former approaches to malware detection. The experimental results indicate that the proposed method's predictive time and detection accuracy are higher than that of previous machine learning and deep learning methods.

[1]  Srinivas Mukkamala,et al.  Image visualization based malware detection , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[2]  Eul Gyu Im,et al.  Malware analysis method using visualization of binary files , 2013, RACS.

[3]  Farhan Ullah,et al.  Identification of malicious code variants based on image visualization , 2019, Comput. Electr. Eng..

[4]  Fadi Al-Turjman,et al.  A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks , 2020, Ad Hoc Networks.

[5]  Fadi Al-Turjman,et al.  Secure data transmission framework for confidentiality in IoTs , 2019, Ad Hoc Networks.

[6]  Jake Bouvrie,et al.  Notes on Convolutional Neural Networks , 2006 .

[7]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[8]  Abien Fred Agarap,et al.  Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification , 2017, ArXiv.

[9]  Eul Gyu Im,et al.  Malware analysis using visualized images and entropy graphs , 2014, International Journal of Information Security.

[10]  Yuval Elovici,et al.  Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..

[11]  Yao Du,et al.  An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs , 2017, IEEE Access.

[12]  Divya Bansal,et al.  Malware Analysis and Classification: A Survey , 2014 .

[13]  Fadi Al-Turjman,et al.  Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning , 2019, IEEE Access.

[14]  Muhammad Ahsan Latif,et al.  Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.

[15]  Farhan Ullah,et al.  Scalable Mutation Testing Using Predictive Analysis of Deep Learning Model , 2019, IEEE Access.

[16]  Ali Hamzeh,et al.  Visual malware detection using local malicious pattern , 2018, Journal of Computer Virology and Hacking Techniques.

[17]  Songqing Yue,et al.  Imbalanced Malware Images Classification: a CNN based Approach , 2017, ArXiv.

[18]  Srinivas Mukkamala,et al.  Packer identification using Byte plot and Markov plot , 2015, Journal of Computer Virology and Hacking Techniques.

[19]  Jinjun Chen,et al.  Detection of Malicious Code Variants Based on Deep Learning , 2018, IEEE Transactions on Industrial Informatics.

[20]  Yang Wang,et al.  Malware Classification with Deep Convolutional Neural Networks , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[21]  KyoungSoo Han,et al.  Malware Analysis Using Visualized Image Matrices , 2014, TheScientificWorldJournal.

[22]  Rajesh Kumar,et al.  Malicious Code Detection based on Image Processing Using Deep Learning , 2018, ICCAI 2018.

[23]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[24]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[25]  B. S. Manjunath,et al.  Malware images: visualization and automatic classification , 2011, VizSec '11.

[26]  Chen Li,et al.  Malware variant detection using similarity search over content fingerprint , 2014, The 26th Chinese Control and Decision Conference (2014 CCDC).

[27]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[28]  Junfeng Wang,et al.  Malware detection method based on the control-flow construct feature of software , 2014, IET Inf. Secur..

[29]  Antonio Torralba,et al.  Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.

[30]  Aziz Makandar,et al.  Malware class recognition using image processing techniques , 2017, 2017 International Conference on Data Management, Analytics and Innovation (ICDMAI).