Cloud-based Detection of Malware and Software Privacy Threats in Internet of Things using Deep Learning Approach

International Journal of Electronics and Communication Engineering
© 2023 by SSRG - IJECE Journal
Volume 10 Issue 4
Year of Publication : 2023
Authors : C. Narmadha, R. Muthuselvi, P. Somasundari, G. Sivagurunathan, Malini K V, Sathishkannan
pdf
How to Cite?

C. Narmadha, R. Muthuselvi, P. Somasundari, G. Sivagurunathan, Malini K V, Sathishkannan, "Cloud-based Detection of Malware and Software Privacy Threats in Internet of Things using Deep Learning Approach," SSRG International Journal of Electronics and Communication Engineering, vol. 10,  no. 4, pp. 21-30, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I4P103

Abstract:

The term "cyber-physical system" (CPS) refers to integrating computational and communication capabilities with physical processes. Because of patient data's regulatory and ethical implications, cybersecurity has emerged as a critical issue in the healthcare industry. Because of the sensitive nature of patient information, the layout of CPS models for any large databases requires extra precautions. Protecting user privacy and fending off attacks like spoofing, DoS, jamming, and eavesdropping are essential for cloud storage, which integrates multiple databases to deliver cutting-edge, intelligent services. This manuscript proposes a hybrid deep-learning method for scanning the entire IoT network for malware and pirated software. It is suggested that a Deep learning deep neural network be used to detect source code plagiarism in pirated software. Source code plagiarism is filtered through tokenisation and weighted feature methods, magnifying each token's significance. Next, we use a deep learning method to check for copied code. The data comes from Google's Code Jam (GCJ), and it was gathered with the intention of studying software theft. In addition, malicious infections in an IoT network can be detected by means of colour image visualisation using a deep convolutional neural network. Malware samples from the Maling dataset are used in the experiments. The experimental results show that the proposed methodology outperforms state-of-the-art methods in terms of classification performance when gauging the severity of cybersecurity threats in the Internet of Things (IoT).

Keywords:

Cybersecurity, Malware Detection, Normalization, Software privacy, Tokenization.

References:

[1] Guneet Bedi et al., “Review of Internet of Things (IoT) in Electric Power and Energy Systems,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 847–870, 2018.
[CrossRef] [Google Scholar] [Publisher link]
[2] Hugh Boyes et al., “The Industrial Internet of Things (IIoT): An Analysis Framework,” Computers in Industrial, vol. 101, pp. 1–12, 2018.
[CrossRef] [Google Scholar] [Publisher link]
[3] Emiliano Sisinni et al., “Industrial Internet of Things: Challenges, Opportunities, and Directions,” IEEE Transactions on Industrial Informatics, vol. 14, no. 11, pp. 4724–4734, 2018.
[CrossRef] [Google Scholar] [Publisher link]
[4] Xiaoding Wang et al., “A Secure Data Aggregation Strategy in Edge Computing and Blockchain Empowered Internet of Things,” IEEE Internet Things Journal, vol. 9, no. 16, pp. 14237-14246, 2022.
[CrossRef] [Google Scholar] [Publisher link]
[5] Jayasree Sengupta, Sushmita Ruj, and Sipra Das Bit, “A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT,” Journal of Network and Computer Applications, vol. 149, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[6] Rajkumar Buyya et al., “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599–616, 2009.
[CrossRef] [Google Scholar] [Publisher link]
[7] Daming Li et al., “A Novel CNN Based Security Guaranteed Image Watermarking Generation Scenario for Smart City Applications,” Information Sciences, vol. 479, pp. 432–447, 2019.
[CrossRef] [Google Scholar] [Publisher link]
[8] Mehedi Masud et al., “A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in Covid-19 Patients Care,” IEEE Internet Things Journal, vol. 8, no. 21, pp. 15694, 15703, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[9] S. Masood Ahamed, and V.N. Sharma, “Malware Detection using Optimized Random Forest Classifier within Mobile Devices,” SSRG International Journal of Computer Science and Engineering, vol. 3, no. 5, pp. 46-52, 2016.
[CrossRef] [Publisher link]
[10] Weizheng Wang et al., “Data Freshness Optimization under CAA in the UAV-Aided MECN: A Potential Game Perspective,” IEEE Transactions on Intelligent Transportation Systems, pp. 1-10, 2022.
[CrossRef] [Google Scholar] [Publisher link]
[11] Supriya Yarradoddi, and Thippa Reddy Gadekallu, Federated Learning Role in Big Data, Jot Services and Applications Security, Privacy and Trust in Jot a Survey, Trust, Security and Privacy for Big Data, CRC Press, 2022.
[Google Scholar] [Publisher link]
[12] M. Parimala et al., “Fusion of Federated Learning and Industrial Internet of Things: A Survey,” arXiv 2021, arXiv:2101.00798, 2021.
[CrossRef] [Google Scholar] [Publisher link]
[13] Shaashwat Agrawal et al., “Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions,” Computer Communication, 2021.
[CrossRef] [Google Scholar] [Publisher link]
[14] Rajesh Gupta et al., “Smart Contract Privacy Protection using AI in Cyber-physical Systems: Tools, Techniques and Challenges,” IEEE Access, vol. 8, pp. 24746–24772, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[15] Mahmudul Hasan et al., “Attack and Anomaly Detection in IoT Sensors in IoT Sites using Machine Learning Approaches,” Internet of Things, vol. 7, p. 100059, 2019.
[CrossRef] [Google Scholar] [Publisher link]
[16] Marwa Keshk et al., “An Integrated Framework for Privacy-preserving based Anomaly Detection for Cyber-physical Systems,” IEEE Transactions on Sustainable Computing, vol. 6, no. 1, pp. 66-79, 2019.
[CrossRef] [Google Scholar] [Publisher link]
[17] Raveendranadh Bokka, and Tamilselvan Sadasivam, “Securing IoT Networks: RPL Attack Detection with Deep Learning GRU Networks,” International Journal of Recent Engineering Science, vol. 10, no. 2, pp. 13-21, 2023.
[CrossRef] [Publisher link]
[18] Pooja Yadav, Ankur Mittal, and Hemant Yadav, “IoT: Challenges and Issues in Indian Perspective,” 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), 2018.
[CrossRef] [Google Scholar] [Publisher link]
[19] Trung V. Phan, and Minho Park, “Efficient Distributed Denial-of Service Attack Defense in SDN-Based Cloud,” IEEE Access, vol. 7, pp. 18701-18714, 2019.
[CrossRef] [Google Scholar] [Publisher link]
[20] Latif U. Khan et al., “Federated Learning for Internet of Things: Recent Advances, Taxonomy, and Open Challenges,” IEEE Communications Surveys and Tutorials, vol. 23, no. 3, pp. 1759-1799, 2021.
[CrossRef] [Google Scholar] [Publisher link]
[21] Xiaopeng Li et al., “Detection Method of Hardware Trojan based on Wavelet Noise Reduction and Neural Network,” Cloud Computing and Security, pp. 256–265, 2018.
[CrossRef] [Google Scholar] [Publisher link]
[22] Prateek Pandey, and Ratnesh Litoriya, “Securing and Authenticating Healthcare Records through Blockchain Technology,” Cryptologia, vol. 44, no. 4, pp. 341–356, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[23] Yingying Yao et al., “BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services,” IEEE Internet Things Journal, vol. 6, no. 2, pp. 3775–3784, 2019.
[CrossRef] [Google Scholar] [Publisher link]
[24] Jing Wang et al., “Blockchain-based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1984–1992, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[25] R.Surendiran, and K.Alagarsamy, “A Crtitical Approach for Intruder Detection in Mobile Devices,” SSRG International Journal of Computer Science and Engineering, vol. 1, no. 4, pp. 6-14, 2014.
[CrossRef] [Publisher link]
[26] Honghao Gao et al., “Mining Consuming Behaviors with Temporal Evolution for Personalized Recommendation in Mobile Marketing Apps,” Mobile Networks and Applications, vol. 25, no. 4, pp. 1233–1248, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[27] Yanmiao Li et al., “Robust Detection for Network Intrusion of Industrial IoT Based on Multi-CNN Fusion,” Measurement, vol. 154, p. 107450, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[28] Luke R. Parker et al., “Demise: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection,” 14th International Conference on Availability, Reliability and Security, pp. 1–10, 2019.
[CrossRef] [Google Scholar] [Publisher link]
[29] Zhihong Tian et al., “A Distributed Deep Learning System for Web Attack Detection on Edge Devices,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1963–1971, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[30] Lei Bai et al., “Automatic Device Classification from Network Traffic Streams of Internet of Things,” IEEE 43rd Conference on Local Computer Networks (LCN), 2018.
[CrossRef] [Google Scholar] [Publisher link]
[31] Joshua Bassey et al., “Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning,” 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), 2019.
[CrossRef] [Google Scholar] [Publisher link]
[32] S. Veerapandi, R. Surendiran, and K. Alagarsamy, “Enhanced Fault Tolerant Cloud Architecture to Cloud based Computing using Both Proactive and Reactive Mechanisms,” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 32-40, 2022.
[Google Scholar]
[33] Youbiao He, Gihan J. Mendis, and Jin Wei, “Real-time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning based Intelligent Mechanism,” IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2505–2516, 2017.
[CrossRef] [Google Scholar] [Publisher link]
[34] Xiaofei Wang et al., “In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning,” IEEE Network, vol. 33, no. 5, pp. 156–165, 2019.
[CrossRef] [Google Scholar] [Publisher link]
[35] Ahmed Sedik et al., “Efficient Deep Learning Approach for Augmented Detection of Coronavirus Disease,” Neural Computing and Applications, vol. 34, pp. 11423-1140, 2022.
[CrossRef] [Google Scholar] [Publisher link]
[36] S. Veerapandi, R. Surendiran, and K. Alagarsamy, “Live Virtual Machine Pre-copy Migration Algorithm for Fault Isolation in Cloud Based Computing Systems,” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 23-31, 2022.
[Google Scholar]
[37] Chao Liang et al., “Intrusion Detection System for Internet of Things Based on a Machine Learning Approach,” 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), 2019.
[CrossRef] [Google Scholar] [Publisher link]