Deakin University
Browse
sharmeen-malwarethreats-2018.pdf (10.47 MB)

Malware Threats and Detection for Industrial Mobile-IoT Networks

Download (10.47 MB)
Version 2 2024-06-04, 04:37
Version 1 2018-06-18, 12:23
journal contribution
posted on 2024-06-04, 04:37 authored by S Sharmeen, Shamsul HudaShamsul Huda, Jemal AbawajyJemal Abawajy, WN Ismail, MM Hassan
Industrial IoT networks deploy heterogeneous IoT devices to meet a wide range of user requirements. These devices are usually pooled from private or public IoT cloud providers. A significant number of IoT cloud providers integrate smartphones to overcome the latency of IoT devices and low computational power problems. However, the integration of mobile devices with industrial IoT networks exposes the IoT devices to significant malware threats. Mobile malware is the highest threat to the security of IoT data, user's personal information, identity, and corporate/financial information. This paper analyzes the efforts regarding malware threats aimed at the devices deployed in industrial mobile-IoT networks and related detection techniques. We considered static, dynamic, and hybrid detection analysis. In this performance analysis, we compared static, dynamic, and hybrid analyses on the basis of data set, feature extraction techniques, feature selection techniques, detection methods, and the accuracy achieved by these methods. Therefore, we identify suspicious API calls, system calls, and the permissions that are extracted and selected as features to detect mobile malware. This will assist application developers in the safe use of APIs when developing applications for industrial IoT networks.

History

Journal

IEEE Access

Volume

6

Pagination

15941-15957

Location

Piscataway, N.J.

Open access

  • Yes

ISSN

2169-3536

eISSN

2169-3536

Language

English

Publication classification

C Journal article, C1 Refereed article in a scholarly journal

Copyright notice

2018, IEEE

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC