Malware detection technique in IoT with Data mining methods

No Thumbnail Available
Journal Title
Journal ISSN
Volume Title
Perustieteiden korkeakoulu | Master's thesis
Date
2018-11-07
Department
Major/Subject
Security and Cloud Computing
Mcode
SCI3084
Degree programme
Master’s Programme in Computer, Communication and Information Sciences
Language
en
Pages
43+9
Series
Abstract
Malware plays a major role as a threat to the security of computer systems. As the Internet of things and its systems of connectivity increase all around the world, it has led to an astronomical increase of malware that target these IoT devices. From DDoS attacks to crytomining malware, companies and industries nowadays encounter problems through malware attack that were not existent a few years ago or have evolved to the new environment of IoT, taking advantage of its vulnerabilities such as the inadequate security monitoring and protection systems. This thesis research surveys the types of attack that are common to IoT technology, current detection techniques, learning techniques and machine learning algorithms that are popularly used for malware detection. This paper then further continues to use a dataset of extracted network traffic features from benign and malicious trace data. With the aid of tools such as Rapid Miner and the use of algorithms such as Artificial Neural Network, statistical analysis of data is evaluated with clear evidence of anomaly detection and a proposed model for network anomaly detection with a low false positive rate and high detection accuracy is presented.
Description
Supervisor
Framling, Kary
Thesis advisor
Yousefnezhad, Narges
Pantiukhin, Igor
Keywords
Internet of Things, artificial neural networks, network intrusion detection system, distributed denial of service, malware analyses
Other note
Citation