Deep-Learning-Based Approach for IoT Attack and Malware Detection

被引:3
|
作者
Tasci, Burak [1 ]
机构
[1] Firat Univ, Vocat Sch Tech Sci, TR-23119 Elazig, Turkiye
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 18期
关键词
IoT security; 1DCNN; deep learning; malware detection; network attack detection; CIC IoT 2023; CIC-MalMem-2022; CIC-IDS2017; low computational load; real-time applications; INTERNET; FUTURE;
D O I
10.3390/app14188505
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The Internet of Things (IoT), introduced by Kevin Ashton in the late 1990s, has transformed technology usage globally, enhancing efficiency and convenience but also posing significant security challenges. With the proliferation of IoT devices expected to exceed 29 billion by 2030, securing these devices is crucial. This study proposes an optimized 1D convolutional neural network (1D CNN) model for effectively classifying IoT security data. The model architecture includes input, convolutional, self-attention, and output layers, utilizing GELU activation, dropout, and normalization techniques to improve performance and prevent overfitting. The model was evaluated using the CIC IoT 2023, CIC-MalMem-2022, and CIC-IDS2017 datasets, achieving impressive results: 98.36% accuracy, 100% precision, 99.96% recall, and 99.95% F1-score for CIC IoT 2023; 99.90% accuracy, 99.98% precision, 99.97% recall, and 99.96% F1-score for CIC-MalMem-2022; and 99.99% accuracy, 99.99% precision, 99.98% recall, and 99.98% F1-score for CIC-IDS2017. These outcomes demonstrate the model's effectiveness in detecting and classifying various IoT-related attacks and malware. The study highlights the potential of deep-learning techniques to enhance IoT security, with the developed model showing high performance and low computational overhead, making it suitable for real-time applications and resource-constrained devices. Future research should aim at testing the model on larger datasets and incorporating adaptive learning capabilities to further enhance its robustness. This research significantly contributes to IoT security by providing advanced insights into deploying deep-learning models, encouraging further exploration in this dynamic field.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Synchronization and Detection in Molecular Communication Using a Deep-Learning-Based Approach
    Casaleiro, Duarte
    Souto, Nuno M. B.
    Silva, Joao C.
    IEEE ACCESS, 2024, 12 : 192539 - 192553
  • [22] Hybrid Deep Learning Approach Based on LSTM and CNN for Malware Detection
    Thakur, Preeti
    Kansal, Vineet
    Rishiwal, Vinay
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (03) : 1879 - 1901
  • [23] A deep learning approach for host-based cryptojacking malware detection
    Sanda, Olanrewaju
    Pavlidis, Michalis
    Polatidis, Nikolaos
    EVOLVING SYSTEMS, 2024, 15 (01) : 41 - 56
  • [24] Deep Image: A precious image based deep learning method for online malware detection in IoT environment
    Ghahramani, Meysam
    Taheri, Rahim
    Shojafar, Mohammad
    Javidan, Reza
    Wan, Shaohua
    INTERNET OF THINGS, 2024, 27
  • [25] Personal Protective Equipment Detection: A Deep-Learning-Based Sustainable Approach
    Ahmed, Mohammed Imran Basheer
    Saraireh, Linah
    Rahman, Atta
    Al-Qarawi, Seba
    Mhran, Afnan
    Al-Jalaoud, Joud
    Al-Mudaifer, Danah
    Al-Haidar, Fayrouz
    Alkhulaifi, Dania
    Youldash, Mustafa
    Gollapalli, Mohammed
    SUSTAINABILITY, 2023, 15 (18)
  • [26] FER to FFR: a deep-learning-based approach for robust fatigue detection
    Patil, Rachana Yogesh
    Patil, Yogesh H.
    Bhandari, Sheetal U.
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2023, 72 (03) : 203 - 211
  • [27] Streamlining IoT Malware Detection:A Pipeline Based Approach
    Naresh, G.
    Chandu, M. Mohan
    Spandana, H. Sai
    Naik, J. Tulasi Prasad
    Kumar, M. Anil
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [28] Social IoT Approach to Cyber Defense of a Deep-Learning-Based Recognition System in Front of Media Clones Generated by Model Inversion Attack
    Khosravy, Mahdi
    Nakamura, Kazuaki
    Nitta, Naoko
    Dey, Nilanjan
    Crespo, Ruben Gonzalez
    Herrera-Viedma, Enrique
    Babaguchi, Noboru
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (05): : 2694 - 2704
  • [29] Network Flow based IoT Botnet Attack Detection using Deep Learning
    Sriram, S.
    Vinayakumar, R.
    Alazab, Mamoun
    Soman, K. P.
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 189 - 194
  • [30] A Heterogenous IoT Attack Detection through Deep Reinforcement Learning: A Dynamic ML Approach
    Baby, Roshan
    Pooranian, Zahra
    Shojafar, Mohammad
    Tafazolli, Rahim
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 479 - 484