Next Article in Journal
Diagnosis of Rotor Component Shedding in Rotating Machinery: A Data-Driven Approach
Previous Article in Journal
Vision-Based UAV Detection and Localization to Indoor Positioning System
Previous Article in Special Issue
The Improved Biometric Identification of Keystroke Dynamics Based on Deep Learning Approaches
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Malware Detection for Internet of Things Using One-Class Classification

by
Tongxin Shi
1,
Roy A. McCann
2,
Ying Huang
3,
Wei Wang
1 and
Jun Kong
1,*
1
Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA
2
Department of Electrical Engineering, University of Arkansas, Fayetteville, AR 72701, USA
3
Department of Civil, Construction and Environmental Engineering, North Dakota State University, Fargo, ND 58102, USA
*
Author to whom correspondence should be addressed.
Submission received: 21 May 2024 / Revised: 12 June 2024 / Accepted: 19 June 2024 / Published: 25 June 2024
(This article belongs to the Special Issue AI Technology for Cybersecurity and IoT Applications)

Abstract

The increasing usage of interconnected devices within the Internet of Things (IoT) and Industrial IoT (IIoT) has significantly enhanced efficiency and utility in both personal and industrial settings but also heightened cybersecurity vulnerabilities, particularly through IoT malware. This paper explores the use of one-class classification, a method of unsupervised learning, which is especially suitable for unlabeled data, dynamic environments, and malware detection, which is a form of anomaly detection. We introduce the TF-IDF method for transforming nominal features into numerical formats that avoid information loss and manage dimensionality effectively, which is crucial for enhancing pattern recognition when combined with n-grams. Furthermore, we compare the performance of multi-class vs. one-class classification models, including Isolation Forest and deep autoencoder, that are trained with both benign and malicious NetFlow samples vs. trained exclusively on benign NetFlow samples. We achieve 100% recall with precision rates above 80% and 90% across various test datasets using one-class classification. These models show the adaptability of unsupervised learning, especially one-class classification, to the evolving malware threats in the IoT domain, offering insights into enhancing IoT security frameworks and suggesting directions for future research in this critical area.
Keywords: malware detection; anomaly detection; autoencoder; one-class classification malware detection; anomaly detection; autoencoder; one-class classification

Share and Cite

MDPI and ACS Style

Shi, T.; McCann, R.A.; Huang, Y.; Wang, W.; Kong, J. Malware Detection for Internet of Things Using One-Class Classification. Sensors 2024, 24, 4122. https://0-doi-org.brum.beds.ac.uk/10.3390/s24134122

AMA Style

Shi T, McCann RA, Huang Y, Wang W, Kong J. Malware Detection for Internet of Things Using One-Class Classification. Sensors. 2024; 24(13):4122. https://0-doi-org.brum.beds.ac.uk/10.3390/s24134122

Chicago/Turabian Style

Shi, Tongxin, Roy A. McCann, Ying Huang, Wei Wang, and Jun Kong. 2024. "Malware Detection for Internet of Things Using One-Class Classification" Sensors 24, no. 13: 4122. https://0-doi-org.brum.beds.ac.uk/10.3390/s24134122

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop