Preliminary Analysis of Malware Detection in Opcode Sequences within IoT Environment
- 1 Universiti Putra Malaysia, Malaysia
- 2 Universiti Tun Hussein Onn Malaysia, Malaysia
- 3 Sunway University, Malaysia
Abstract
With the technological development and means of communication, the Internet of Things (IoT) has become an essential role in providing many services in daily life through millions of heterogeneous but interconnected devices and nodes. This development is opening to many security and privacy challenges that can cause complete network breakdown, bypassed access control or the loss of critical data. This paper attempts to provide a preliminary analysis for malware detection within data generated by IoT-based devices and services in the form of operational codes (Opcode) sequences. Three machine learning algorithms are evaluated and compared for accuracy, precision, recall and F-measure. The results showed that the Random Forest (RF) achieved the best accuracy of 98%, followed by SVM and k-NN, both with 91%. The results are further analyzed based on the Receiver Operating Characteristic (ROC) curve and Precision-Recall curve to further illustrate the difference in performance of all three algorithms when dealing with IoT data.
DOI: https://doi.org/10.3844/jcssp.2020.1306.1318
Copyright: © 2020 Firas Shihab Ahmed, Norwati Mustapha, Aida Mustapha, Mohsen Kakavand and Cik Feresa Mohd Foozy. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 3,608 Views
- 1,415 Downloads
- 18 Citations
Download
Keywords
- Machine Learning
- Malware Detection
- Operation Codes