Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation (2108.13373v1)

Published 30 Aug 2021 in cs.CR and cs.LG

Abstract: The rapid growth of the Internet of Things (IoT) devices is paralleled by them being on the front-line of malicious attacks. This has led to an explosion in the number of IoT malware, with continued mutations, evolution, and sophistication. These malicious software are detected using ML algorithms alongside the traditional signature-based methods. Although ML-based detectors improve the detection performance, they are susceptible to malware evolution and sophistication, making them limited to the patterns that they have been trained upon. This continuous trend motivates the large body of literature on malware analysis and detection research, with many systems emerging constantly, and outperforming their predecessors. In this work, we systematically examine the state-of-the-art malware detection approaches, that utilize various representation and learning techniques, under a range of adversarial settings. Our analyses highlight the instability of the proposed detectors in learning patterns that distinguish the benign from the malicious software. The results exhibit that software mutations with functionality-preserving operations, such as stripping and padding, significantly deteriorate the accuracy of such detectors. Additionally, our analysis of the industry-standard malware detectors shows their instability to the malware mutations.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Ahmed Abusnaina (11 papers)
  2. Afsah Anwar (9 papers)
  3. Sultan Alshamrani (3 papers)
  4. Abdulrahman Alabduljabbar (6 papers)
  5. David Mohaisen (43 papers)
  6. DaeHun Nyang (30 papers)
  7. Rhongho Jang (8 papers)
Citations (1)

Summary

We haven't generated a summary for this paper yet.