Your browser doesn't support javascript.
loading
Artificial intelligence-driven malware detection framework for internet of things environment.
Alsubai, Shtwai; Dutta, Ashit Kumar; Alnajim, Abdullah M; Wahab Sait, Abdul Rahaman; Ayub, Rashid; AlShehri, Afnan Mushabbab; Ahmad, Naved.
Afiliação
  • Alsubai S; Prince Sattam Bin Abdulaziz University, Al-Kharj, Kingdom of Saudi Arabia.
  • Dutta AK; Department of Computer Science and Information Technology, Almaarefa University, Riyadh, Kingdom of Saudi Arabia.
  • Alnajim AM; Department of Information Technology, College of computer, Qassim University, Buraydah, Saudi Arabia.
  • Wahab Sait AR; Department of Archives and Communication, King Faisal University, Al Ahsa, Hofuf, Kingdom of Saudi Arabia.
  • Ayub R; Department of Science Technology & Innovation Unit, King Saud University, Riyadh, Saudi Arabia.
  • AlShehri AM; Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Ad Diriyah, Riyadh, Kingdom of Saudi Arabia.
  • Ahmad N; Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Ad Diriyah, Riyadh, Kingdom of Saudi Arabia.
PeerJ Comput Sci ; 9: e1366, 2023.
Article em En | MEDLINE | ID: mdl-37346520
ABSTRACT
The Internet of Things (IoT) environment demands a malware detection (MD) framework for protecting sensitive data from unauthorized access. The study intends to develop an image-based MD framework. The authors apply image conversion and enhancement techniques to convert malware binaries into RGB images. You only look once (Yolo V7) is employed for extracting the key features from the malware images. Harris Hawks optimization is used to optimize the DenseNet161 model to classify images into malware and benign. IoT malware and Virusshare datasets are utilized to evaluate the proposed framework's performance. The outcome reveals that the proposed framework outperforms the current MD framework. The framework generates the outcome at an accuracy and F1-score of 98.65 and 98.5 and 97.3 and 96.63 for IoT malware and Virusshare datasets, respectively. In addition, it achieves an area under the receiver operating characteristics and the precision-recall curve of 0.98 and 0.85 and 0.97 and 0.84 for IoT malware and Virusshare datasets, accordingly. The study's outcome reveals that the proposed framework can be deployed in the IoT environment to protect the resources.
Palavras-chave

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Diagnostic_studies / Prognostic_studies Idioma: En Revista: PeerJ Comput Sci Ano de publicação: 2023 Tipo de documento: Article

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Diagnostic_studies / Prognostic_studies Idioma: En Revista: PeerJ Comput Sci Ano de publicação: 2023 Tipo de documento: Article