A Survey of Machine Learning Algorithms for Detecting Malware in IoT Firmware

by   Erik Larsen, et al.

This work explores the use of machine learning techniques on an Internet-of-Things firmware dataset to detect malicious attempts to infect edge devices or subsequently corrupt an entire network. Firmware updates are uncommon in IoT devices; hence, they abound with vulnerabilities. Attacks against such devices can go unnoticed, and users can become a weak point in security. Malware can cause DDoS attacks and even spy on sensitive areas like peoples' homes. To help mitigate this threat, this paper employs a number of machine learning algorithms to classify IoT firmware and the best performing models are reported. In a general comparison, the top three algorithms are Gradient Boosting, Logistic Regression, and Random Forest classifiers. Deep learning approaches including Convolutional and Fully Connected Neural Networks with both experimental and proven successful architectures are also explored.


page 2

page 3

page 4

page 5

page 6

page 7

page 9


EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques

The widespread adoption of Internet of Things has led to many security i...

Ransomware Classification and Detection With Machine Learning Algorithms

Malicious attacks, malware, and ransomware families pose critical securi...

Lightweight IoT Malware Detection Solution Using CNN Classification

Internet of Things (IoT) is becoming more frequently used in more applic...

Analysis of Machine Learning Approaches to Packing Detection

Packing is an obfuscation technique widely used by malware to hide the c...

Malware Classification Using Transfer Learning

With the rapid growth of the number of devices on the Internet, malware ...

Collaborative Machine Learning-Driven Internet of Medical Things – A Systematic Literature Review

The growing adoption of IoT devices for healthcare has enabled researche...

Dynamic Analysis of Executables to Detect and Characterize Malware

It is needed to ensure the integrity of systems that process sensitive i...