Harnessing the Power of Decision Trees to Detect IoT Malware

by   Marwan Omar, et al.

Due to its simple installation and connectivity, the Internet of Things (IoT) is susceptible to malware attacks. Being able to operate autonomously. As IoT devices have become more prevalent, they have become the most tempting targets for malware. Weak, guessable, or hard-coded passwords, and a lack of security measures contribute to these vulnerabilities along with insecure network connections and outdated update procedures. To understand IoT malware, current methods and analysis ,using static methods, are ineffective. The field of deep learning has made great strides in recent years due to their tremendous data mining, learning, and expression capabilities, cybersecurity has enjoyed tremendous growth in recent years. As a result, malware analysts will not have to spend as much time analyzing malware. In this paper, we propose a novel detection and analysis method that harnesses the power and simplicity of decision trees. The experiments are conducted using a real word dataset, MaleVis which is a publicly available dataset. Based on the results, we show that our proposed approach outperforms existing state-of-the-art solutions in that it achieves 97.23 classification. A specificity of 96.58 96.43.


page 1

page 2

page 3

page 4


Analyzing Endpoints in the Internet of Things Malware

The lack of security measures in the Internet of Things (IoT) devices an...

Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation

Internet of Things devices have seen a rapid growth and popularity in re...

Lightweight Classification of IoT Malware based on Image Recognition

The Internet of Things (IoT) is an extension of the traditional Internet...

Current State of IPv6 Security in IoT

This report presents the current state of security in IPv6 for IoT devic...

MALITE: Lightweight Malware Detection and Classification for Constrained Devices

Today, malware is one of the primary cyberthreats to organizations. Malw...

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

In recent years, malware detection has become an active research topic i...

Volenti non fit injuria: Ransomware and its Victims

With the recent growth in the number of malicious activities on the inte...

Please sign up or login with your details

Forgot password? Click here to reset