• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网恶意软件:基于属性的分类法、检测机制与挑战。

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.

作者信息

Victor Princy, Lashkari Arash Habibi, Lu Rongxing, Sasi Tinshu, Xiong Pulei, Iqbal Shahrear

机构信息

Faculty of Computer Science, University of New Brunswick, Fredericton, NB E3B 5A3 Canada.

School of Information Technology, York University, Toronto, ON M3J 1P3 Canada.

出版信息

Peer Peer Netw Appl. 2023 May 10:1-52. doi: 10.1007/s12083-023-01478-w.

DOI:10.1007/s12083-023-01478-w
PMID:37362097
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10170447/
Abstract

During the past decade, the Internet of Things (IoT) has paved the way for the ongoing digitization of society in unique ways. Its penetration into enterprise and day-to-day lives improved the supply chain in numerous ways. Unfortunately, the profuse diversity of IoT devices has become an attractive target for malware authors who take advantage of its vulnerabilities. Accordingly, enhancing the security of IoT devices has become the primary objective of industrialists and researchers. However, most present studies lack a deep understanding of IoT malware and its various aspects. As understanding IoT malware is the preliminary base of research, in this work, we present an IoT malware taxonomy with 100 attributes based on the IoT malware categories, attack types, attack surfaces, malware distribution architecture, victim devices, victim device architecture, IoT malware characteristics, access mechanisms, programming languages, and protocols. In addition, we have mapped these categories into 77 IoT Malwares identified between 2008 and 2022. Furthermore, To provide insight into the challenges in IoT malware research for future researchers, our study also reviews the existing IoT malware detection works.

摘要

在过去十年中,物联网(IoT)以独特的方式为社会的持续数字化铺平了道路。它渗透到企业和日常生活中,在许多方面改善了供应链。不幸的是,物联网设备的大量多样性已成为恶意软件作者利用其漏洞的一个有吸引力的目标。因此,增强物联网设备的安全性已成为实业家和研究人员的主要目标。然而,目前大多数研究对物联网恶意软件及其各个方面缺乏深入了解。由于了解物联网恶意软件是研究的初步基础,在这项工作中,我们基于物联网恶意软件类别、攻击类型、攻击面、恶意软件分发架构、受害设备、受害设备架构、物联网恶意软件特征、访问机制、编程语言和协议,提出了一种具有100个属性的物联网恶意软件分类法。此外,我们已将这些类别映射到2008年至2022年间识别出的77种物联网恶意软件。此外,为了让未来的研究人员深入了解物联网恶意软件研究中的挑战,我们的研究还回顾了现有的物联网恶意软件检测工作。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/47ed/10170447/4719b68f88b1/12083_2023_1478_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/47ed/10170447/528ec1a65f5e/12083_2023_1478_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/47ed/10170447/c00a76d64183/12083_2023_1478_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/47ed/10170447/4719b68f88b1/12083_2023_1478_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/47ed/10170447/528ec1a65f5e/12083_2023_1478_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/47ed/10170447/c00a76d64183/12083_2023_1478_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/47ed/10170447/4719b68f88b1/12083_2023_1478_Fig3_HTML.jpg

相似文献

1
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.物联网恶意软件:基于属性的分类法、检测机制与挑战。
Peer Peer Netw Appl. 2023 May 10:1-52. doi: 10.1007/s12083-023-01478-w.
2
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning.基于深度学习的物联网(IoT)设备恶意软件检测。
Sensors (Basel). 2022 Nov 29;22(23):9305. doi: 10.3390/s22239305.
3
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
4
IoT malware detection architecture using a novel channel boosted and squeezed CNN.使用新型通道增强与压缩卷积神经网络的物联网恶意软件检测架构
Sci Rep. 2022 Sep 15;12(1):15498. doi: 10.1038/s41598-022-18936-9.
5
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.基于卷积神经网络微调随机森林投票的物联网恶意软件新型检测与多分类方法。
Sensors (Basel). 2022 Jun 6;22(11):4302. doi: 10.3390/s22114302.
6
MDABP: A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS.MDABP:一种基于 PaaS 的新型跨体系结构 IoT 恶意软件检测方法。
Sensors (Basel). 2023 Mar 13;23(6):3060. doi: 10.3390/s23063060.
7
Artificial intelligence-driven malware detection framework for internet of things environment.用于物联网环境的人工智能驱动的恶意软件检测框架。
PeerJ Comput Sci. 2023 May 29;9:e1366. doi: 10.7717/peerj-cs.1366. eCollection 2023.
8
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.基于 OpCode 级函数调用图的深度学习的安卓恶意软件分类。
Sensors (Basel). 2020 Jun 29;20(13):3645. doi: 10.3390/s20133645.
9
Malware Detection for Internet of Things Using One-Class Classification.使用单类分类的物联网恶意软件检测
Sensors (Basel). 2024 Jun 25;24(13):4122. doi: 10.3390/s24134122.
10
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.物联网僵尸网络分布式拒绝服务攻击的系统文献综述及检测技术评估
Sensors (Basel). 2024 Jun 1;24(11):3571. doi: 10.3390/s24113571.

引用本文的文献

1
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions.智慧城市中物联网设备认证技术综述:机遇、挑战与未来方向
Sensors (Basel). 2025 Mar 7;25(6):1649. doi: 10.3390/s25061649.
2
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments.多平台恶意软件检测的机器学习技术调查:保护个人电脑、移动设备、物联网和云环境安全
Sensors (Basel). 2025 Feb 13;25(4):1153. doi: 10.3390/s25041153.
3
Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends.
用于物联网网络异常检测的机器学习和深度学习技术——当前研究趋势
Sensors (Basel). 2024 Mar 20;24(6):1968. doi: 10.3390/s24061968.