IoT-Malware Detection and Classification by Deep Learning Base Feature Mapping and Ensemble Learning
Keywords:
IoT Security, Malware Detection, Deep Learning, CNN, Ensemble Learning, Feature Extraction, Network Traffic Analysis.Abstract
With the rapid proliferation of Internet of Things (IoT) devices, which offer a myriad of ways to breach security, IoT devices have become one of the main targets for malware today. Conventional forms of detection that are based on knowledge of signatures often do not detect newly developed or obfuscated malware. In this work, we propose an ensemble learning approach for a deep learning-based malware detection and classification scheme tailored to the IoT environment. The method involves pre-processing raw network traffic data to preprocess raw network traffic data and convert it into a structured form. After that a one-dimensional Convolutional Neural Network (1D CNN) is leveraged to extract deep/middle level features that would capture the temporal and behavioral features of network traces. Finally, an ensemble of classifiers, Random Forest, Gradient Boosting, and XGBoost, among others, is applied to the computed features for the actual classification. We evaluate our method on the public-dated IoT malware dataset in our project, experiment results demonstrate that our proposed approach achieves better accuracy, precision and recall than baseline methods. The proposed architecture is highly reliable and adaptive to guarantee the effectiveness of real-time IoT protection systems with deep feature mining combined with ensemble learning which has enabled us to maintain the good performance.
References
Fleuret, F., “Fast binandary feature selection with conditional mutual information”, Journal of Machine Learning Research, vol. 5, 2004, pp. 1531– 1555.
Chebrolu, S., Abraham, A., Thomas, P. j., “Feature deduction and ensemble design of intrusion detection systems”, Computer and Security, vol. 24, issue 4, 2005, pp. 295–307.
Mukkamela, S., Sung, A. H., “Significant feature selection using computational intelligent techniques for intrusion detection”, Advanced Information and Knowledge Processing, vol. 24, 2006, pp. 285–306.
Horng, S. J., Su, M.-Y., Chen, Y. H., Kao, T. K., Chen, R. J., Lai, J. L., “A novel intrusion detection system based on hierarchical clustering and support vector machines”, Expert Systems with Applications, vol. 38, issue 1, 2011, pp. 306-313.
Amiri, F., Yousefi, M. M. R., Lucas, C., Shakery, A., and Yazdani, N., “Mutual information-based feature selection for intrusion detection”, Network and Computer Application, vol. 34, issue 04, 2011, pp. 1184–1199.
Dwivedi, A., Rana, YK, Patel, BP, “A literature review on agent-based intrusion detection system,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, Issue 10, 2014, pp. 140- 149.
https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system. Date: 21/02/2019.
Uguz, H., “Two stage feature selection method for text categorization by using information gain, principal component analysis and genetic algorithm”, Journal of Knowledge Based Systems, vol. 24, issue 07, 2011, pp.1024–1032.
Mukherjee, S., Sharma, N., “Intrusion detection using Naïve Bayes classifier with feature reduction”, Procedia Technology, vol. 4, 2012, pp. 119–128.
Li, Y., Xia, J., Zhang, S., Yan, J., Chuan, X., Dai, K., “An efficient intrusion detection system based on support vector machine and gradually features removal method”, Expert System with Applications, vol. 39, issue 01, 2012, pp. 424–430.
Karimi, Z., Mansour, M., Harounabadi, A., “Feature ranking in intrusion detection dataset using combination of filter methods”, International Journal of Computer Application, vol. 78, issue 04, 2013, pp. 21–27.
Al-Jarrah, O. Y., Siddiqui, A., Elsalamouny, M., Yoo, P. D., Muhaidat, S., Kim, K., “Machine learning based feature selection techniques for large scale intrusion detection”, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), Madrid, 2014, pp. 177-181.
M. A. Simkin and A. K. McLeod, “Why Do College Students Cheat?,” Journal of Business Ethics, vol. 94, no. 3, pp. 441–453, 2010.
M. S. Mahdavifar and H. Ghasemi, “Cyberattack detection in industrial control systems using deep belief network,” International Journal of Critical Infrastructure Protection, vol. 19, pp. 133–137, 2017.
M. A. Ferrag, L. Maglaras, A. Derhab, S. Maglaras, and H. Janicke, “Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications, vol. 101, pp. 55–82, 2018.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Saad Talib Hasson, Murtdha Saadoon Balasim

This work is licensed under a Creative Commons Attribution 4.0 International License.