Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security

نویسندگان

چکیده

With the construction of smart cities, number Internet Things (IoT) devices is growing rapidly, leading to an explosive growth malware designed for IoT devices. These pose a serious threat security The traditional classification methods mainly rely on feature engineering. To improve accuracy, large different types features will be extracted from files in these methods. That brings high complexity classification. solve issues, method based Word2Vec and Multilayer Perception (MLP) proposed this article. First, one sample, used calculate word vector all bytes binary file instructions assembly file. Second, we combine vectors into 256x256x2-dimensional matrix. Finally, deep learning network structure MLP train model. Then model classify testing samples. experimental results prove that has accuracy 99.54%.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight Classification of IoT Malware based on Image Recognition

The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very large number of smart devices, such as home appliances, network cameras, sensors and controllers to connect to one another to share information and improve user experiences. Current IoT devices are typically micro-computers for domain-specific computations rather than traditional functionspecific embed...

متن کامل

Linear SVM-Based Android Malware Detection for Reliable IoT Services

Current many Internet ofThings (IoT) services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. Inmost cases, mobile devices have become clutteredwith important personal user...

متن کامل

IoT Security Techniques Based on Machine Learning

Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...

متن کامل

Requirement of Security for IoT Application based on Gateway System

An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. The security consideration should satisfy a concise set of cryptographic and security mechanisms, single security policy framework, and configuration...

متن کامل

turkish-israeli relations and their implication on iranian national security

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Internet Technology

سال: 2021

ISSN: ['1533-5399', '1557-6051']

DOI: https://doi.org/10.1145/3436751