Survey of Artificial Intelligence Based IoT Malware Detection

被引:0
|
作者
Liu Q. [1 ,2 ]
Liu J. [1 ,2 ]
Jin Z. [1 ,2 ]
Liu X. [1 ,2 ]
Xiao J. [1 ,2 ]
Chen Y. [1 ,2 ]
Zhu H. [1 ,2 ]
Tan Y. [1 ,2 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
关键词
artificial intelligence (AI); cyber security; detection technology; Internet of things (IoT); malware;
D O I
10.7544/issn1000-1239.202330450
中图分类号
学科分类号
摘要
In recent years, with the large-scale deployment of Internet of things (IoT) devices, there has been a growing emergence of malicious code targeting IoT devices. IoT security is facing significant threats from malicious code, necessitating comprehensive research on IoT malware detection techniques. Following the remarkable achievements of artificial intelligence (AI) in fields such as computer vision (CV) and natural language processing (NLP), the IoT security field has witnessed numerous efforts in AI-based malware detection as well. By reviewing relevant research findings and considering the characteristics of IoT environments and devices, we propose a classification method for the primary motivations behind research in this field and analyze the research development in IoT malware detection from two perspectives: malware detection techniques towards IoT device limitation mitigation and IoT malware detection techniques towards performance improvement. This classification method encompasses the relevant research in IoT malware detection, which also highlights the unique characteristics of IoT devices and the current limitations of the IoT malware detection field. Finally, by summarizing existing research, we extensively discuss the challenges present in AI-based malware detection and present three possible directions for future research that consists of combining foundation models in IoT malware code detection, improving the safety of detection models, and combining zero trust architecture in this field. © 2023 Science Press. All rights reserved.
引用
收藏
页码:2234 / 2254
页数:20
相关论文
共 126 条
  • [1] Number of Internet of things (IoT) connected devices worldwide from 2019 to 2021
  • [2] Wall S., 2022 Cyber threat report, 2022, pp. 5-7
  • [3] Antonakakis M, April T, Bailey M, Et al., Understanding the Mirai botNet[C], Proc of the 26th USENIX Security Symp, pp. 1093-1110, (2017)
  • [4] Griffioen H, Doerr C., Examining Mirai’s battle over the Internet of things[C], Proc of the 27th ACM SIGSAC Conf on Computer and Communications Security (CCS), pp. 743-756, (2020)
  • [5] IoT security threat intelligence report (Oct 2022)[R], pp. 1-426, (2022)
  • [6] Pa Y M P, Suzuki S, Yoshioka K, Et al., IoTPOT: Analysing the rise of IoT compromises[C], Proc of the 9th USENIX Workshop on Offensive Technologies (WOOT), pp. 1-9, (2015)
  • [7] Breitenbacher D, Homoliak I, Aung Y L, Et al., HADES-IoT: A practical host-based anomaly detection system for IoT devices[C], Proc of the 24th ACM Asia Conf on Computer and Communications Security, pp. 479-484, (2019)
  • [8] Cetin O, Ganan C, Altena L, Et al., Cleaning up the Internet of evil things: Real-world evidence on ISP and consumer efforts to remove mirai[C], Proc of the 26th Annual Network and Distributed System Security Symp (NDSS), pp. 1-5, (2019)
  • [9] Xu Yiwen, Jiang Yu, Yu Lu, Et al., Brief industry paper: Catching IoT malware in the wild using HoneyIoT[C], Proc of the 27th Real-Time and Embedded Technology and Applications Symp (RTAS), pp. 433-436, (2021)
  • [10] Dang Fan, Li Zhenhua, Liu Yunhao, Et al., Understanding fileless attacks on Linux-based IoT devices with honeycloud[C], Proc of the 17th Annual Int Conf on Mobile Systems, Applications, and Services, pp. 482-493, (2019)