Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
نویسندگان
چکیده
With the construction of smart cities, number Internet Things (IoT) devices is growing rapidly, leading to an explosive growth malware designed for IoT devices. These pose a serious threat security The traditional classification methods mainly rely on feature engineering. To improve accuracy, large different types features will be extracted from files in these methods. That brings high complexity classification. solve issues, method based Word2Vec and Multilayer Perception (MLP) proposed this article. First, one sample, used calculate word vector all bytes binary file instructions assembly file. Second, we combine vectors into 256x256x2-dimensional matrix. Finally, deep learning network structure MLP train model. Then model classify testing samples. experimental results prove that has accuracy 99.54%.
منابع مشابه
Lightweight Classification of IoT Malware based on Image Recognition
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very large number of smart devices, such as home appliances, network cameras, sensors and controllers to connect to one another to share information and improve user experiences. Current IoT devices are typically micro-computers for domain-specific computations rather than traditional functionspecific embed...
متن کاملLinear SVM-Based Android Malware Detection for Reliable IoT Services
Current many Internet ofThings (IoT) services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. Inmost cases, mobile devices have become clutteredwith important personal user...
متن کاملIoT Security Techniques Based on Machine Learning
Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...
متن کاملRequirement of Security for IoT Application based on Gateway System
An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. The security consideration should satisfy a concise set of cryptographic and security mechanisms, single security policy framework, and configuration...
متن کاملturkish-israeli relations and their implication on iranian national security
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Internet Technology
سال: 2021
ISSN: ['1533-5399', '1557-6051']
DOI: https://doi.org/10.1145/3436751