• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

面向智慧城市应用的资源受限物联网设备中的模糊内存恶意软件检测

Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications.

作者信息

Shafin Sakib Shahriar, Karmakar Gour, Mareels Iven

机构信息

Centre for Smart Analytics (CSA), Federation University Australia, Ballarat, VIC 3350, Australia.

Institute of Innovation, Science and Sustainability (IISS), Federation University Australia, Ballarat, VIC 3350, Australia.

出版信息

Sensors (Basel). 2023 Jun 5;23(11):5348. doi: 10.3390/s23115348.

DOI:10.3390/s23115348
PMID:37300073
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10256113/
Abstract

Obfuscated Memory Malware (OMM) presents significant threats to interconnected systems, including smart city applications, for its ability to evade detection through concealment tactics. Existing OMM detection methods primarily focus on binary detection. Their multiclass versions consider a few families only and, thereby, fail to detect much existing and emerging malware. Moreover, their large memory size makes them unsuitable to be executed in resource-constrained embedded/IoT devices. To address this problem, in this paper, we propose a multiclass but lightweight malware detection method capable of identifying recent malware and is suitable to execute in embedded devices. For this, the method considers a hybrid model by combining the feature-learning capabilities of convolutional neural networks with the temporal modeling advantage of bidirectional long short-term memory. The proposed architecture exhibits compact size and fast processing speed, making it suitable for deployment in IoT devices that constitute the major components of smart city systems. Extensive experiments with the recent CIC-Malmem-2022 OMM dataset demonstrate that our method outperforms other machine learning-based models proposed in the literature in both detecting OMM and identifying specific attack types. Our proposed method thus offers a robust yet compact model executable in IoT devices for defending against obfuscated malware.

摘要

混淆内存恶意软件(OMM)因其能够通过隐藏策略逃避检测,对包括智慧城市应用在内的互联系统构成了重大威胁。现有的OMM检测方法主要集中在二进制检测上。它们的多类版本只考虑少数几个家族,因此无法检测到许多现有的和新出现的恶意软件。此外,它们占用的内存很大,不适合在资源受限的嵌入式/物联网设备中执行。为了解决这个问题,在本文中,我们提出了一种多类但轻量级的恶意软件检测方法,该方法能够识别最新的恶意软件,并且适合在嵌入式设备中执行。为此,该方法通过将卷积神经网络的特征学习能力与双向长短期记忆的时间建模优势相结合,考虑了一种混合模型。所提出的架构具有紧凑的尺寸和快速的处理速度,使其适合部署在构成智慧城市系统主要组件的物联网设备中。使用最新的CIC-Malmem-2022 OMM数据集进行的大量实验表明,我们的方法在检测OMM和识别特定攻击类型方面均优于文献中提出的其他基于机器学习的模型。因此,我们提出的方法提供了一个强大而紧凑的模型,可在物联网设备中执行,以抵御混淆恶意软件。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9012/10256113/4143837f0ca0/sensors-23-05348-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9012/10256113/a9d16086c5be/sensors-23-05348-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9012/10256113/4143837f0ca0/sensors-23-05348-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9012/10256113/a9d16086c5be/sensors-23-05348-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9012/10256113/4143837f0ca0/sensors-23-05348-g002.jpg

相似文献

1
Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications.面向智慧城市应用的资源受限物联网设备中的模糊内存恶意软件检测
Sensors (Basel). 2023 Jun 5;23(11):5348. doi: 10.3390/s23115348.
2
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
3
IoT malware detection architecture using a novel channel boosted and squeezed CNN.使用新型通道增强与压缩卷积神经网络的物联网恶意软件检测架构
Sci Rep. 2022 Sep 15;12(1):15498. doi: 10.1038/s41598-022-18936-9.
4
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.基于卷积神经网络微调随机森林投票的物联网恶意软件新型检测与多分类方法。
Sensors (Basel). 2022 Jun 6;22(11):4302. doi: 10.3390/s22114302.
5
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.基于 OpCode 级函数调用图的深度学习的安卓恶意软件分类。
Sensors (Basel). 2020 Jun 29;20(13):3645. doi: 10.3390/s20133645.
6
Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model.基于可解释人工智能的物联网设备恶意软件检测机制,使用图像可视化和微调的基于卷积神经网络的迁移学习模型。
Comput Intell Neurosci. 2022 Jul 15;2022:7671967. doi: 10.1155/2022/7671967. eCollection 2022.
7
Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism.基于集成投票机制的深度学习评估和分类混淆型 Android 恶意软件。
Sci Rep. 2023 Feb 22;13(1):3093. doi: 10.1038/s41598-023-30028-w.
8
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning.基于深度学习的物联网(IoT)设备恶意软件检测。
Sensors (Basel). 2022 Nov 29;22(23):9305. doi: 10.3390/s22239305.
9
MDABP: A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS.MDABP:一种基于 PaaS 的新型跨体系结构 IoT 恶意软件检测方法。
Sensors (Basel). 2023 Mar 13;23(6):3060. doi: 10.3390/s23063060.
10
CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing.CSMC:一种受压缩感知启发的安全高效的可视化恶意软件分类方法
Sensors (Basel). 2024 Jun 30;24(13):4253. doi: 10.3390/s24134253.

引用本文的文献

1
Transfer learning with XAI for robust malware and IoT network security.结合可解释人工智能的迁移学习,用于强大的恶意软件和物联网网络安全。
Sci Rep. 2025 Jul 24;15(1):26971. doi: 10.1038/s41598-025-12404-w.
2
Enhancing ransomware defense: deep learning-based detection and family-wise classification of evolving threats.增强勒索软件防御:基于深度学习的不断演变威胁的检测与家族式分类
PeerJ Comput Sci. 2024 Nov 29;10:e2546. doi: 10.7717/peerj-cs.2546. eCollection 2024.
3
UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0.

本文引用的文献

1
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.新冠疫情时代的网络安全:疫情期间网络犯罪与网络攻击的时间线及分析
Comput Secur. 2021 Jun;105:102248. doi: 10.1016/j.cose.2021.102248. Epub 2021 Mar 3.
2
A Holistic and Interoperable Approach towards the Implementation of Services for the Digital Transformation of Smart Cities: The Case of Vitoria-Gasteiz (Spain).一种面向智能城市数字化转型服务实施的整体化和互操作性方法:以西班牙维多利亚-加斯泰兹为例。
Sensors (Basel). 2021 Dec 2;21(23):8061. doi: 10.3390/s21238061.
3
A survey on deep learning in medical image analysis.
UnSafengine64:一款适用于64位Windows环境的Safengine解包工具以及关于Safengine 2.4.0的详细分析结果。
Sensors (Basel). 2024 Jan 27;24(3):840. doi: 10.3390/s24030840.
4
A Malicious Code Detection Method Based on Stacked Depthwise Separable Convolutions and Attention Mechanism.一种基于堆叠深度可分离卷积和注意力机制的恶意代码检测方法。
Sensors (Basel). 2023 Aug 10;23(16):7084. doi: 10.3390/s23167084.
深度学习在医学图像分析中的应用研究综述。
Med Image Anal. 2017 Dec;42:60-88. doi: 10.1016/j.media.2017.07.005. Epub 2017 Jul 26.
4
Long short-term memory.长短期记忆
Neural Comput. 1997 Nov 15;9(8):1735-80. doi: 10.1162/neco.1997.9.8.1735.