Performance Evaluation of Deep Learning Techniques in The Detection of IOT Malware

Authors

  • Ayat T. Salim Department of Networks Engineering, Al-Nahrain University. Iraq
  • Ban Mohammed Khammas

DOI:

https://doi.org/10.31987/ijict.6.3.233

Keywords:

IoT security, Deep learning, Intrusion Detection System, Cyber-attacks

Abstract

Internet of Things (IoT) equipment is rapidly being used in a variety of businesses and for a variety of reasons (for example, sensing and collecting data from the environment in both public and military settings). Because of their expanding involvement in a wide range of applications and their rising computational and processing capabilities, they are a viable attack target for malware tailored to infect specific IoT devices. This study investigates the potential of detecting IoT malware using different deep learning techniques: the classic feedforward neural network (FNN), convolutional neural networks (CNN), long short-term memory (LSTM), and recurrent neural networks (RNN). The proposed method analyses the execution operation codes of IOT app sequences using modern NLP (natural language processing) methods. The current work utilized an IoT application dataset with 500 malware (collected from the IOTPOT dataset) and 500 goodware samples to train the proposed algorithms. The trained model is tested against 2971 fresh IoT malware and goodware samples. The samples were input into deep learning models, and performance metrics were obtained. The results demonstrate that the RNN model had the best accuracy (99.19%) in detecting fresh malware samples. On the other hand, the results were compared by the time required for training; the CNN model shows that it could achieve high accuracy (98.05%) with less training time. A comparison with various deep learning classifiers demonstrates that the RNN and CNN techniques produce the best results.

Downloads

Published

2023-12-31

How to Cite

Performance Evaluation of Deep Learning Techniques in The Detection of IOT Malware. (2023). Iraqi Journal of Information and Communication Technology, 6(3), 12-25. https://doi.org/10.31987/ijict.6.3.233

Similar Articles

1-10 of 85

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>