Omar, 2023 - Google Patents
Harnessing the power of decision trees to detect IoT malwareOmar, 2023
View PDF- Document ID
- 15669248181164798774
- Author
- Omar M
- Publication year
- Publication venue
- arXiv preprint arXiv:2301.12039
External Links
Snippet
Due to its simple installation and connectivity, the Internet of Things (IoT) is susceptible to malware attacks. Being able to operate autonomously. As IoT devices have become more prevalent, they have become the most tempting targets for malware. Weak, guessable, or …
- 238000001514 detection method 0 abstract description 73
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Guezzaz et al. | A reliable network intrusion detection approach using decision tree with enhanced data quality | |
| Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
| Bhatia et al. | A comparative study on various intrusion detection techniques using machine learning and neural network | |
| Vinchurkar et al. | A review of intrusion detection system using neural network and machine learning | |
| Reddy | Neural networks for intrusion detection and its applications | |
| Babu et al. | A survey on attack detection methods for iot using machine learning and deep learning | |
| Omar | Harnessing the power of decision trees to detect IoT malware | |
| Ju et al. | Hetemsd: A big data analytics framework for targeted cyber‐attacks detection using heterogeneous multisource data | |
| Sharma et al. | Layered approach for intrusion detection using naïve Bayes classifier | |
| Devprasad et al. | Context adaptive ensemble classification mechanism with multi‐criteria decision making for network intrusion detection | |
| Shankar et al. | Deep analysis of risks and recent trends towards network intrusion detection system | |
| Srinivasan et al. | Intrusion detection and prevention system (IDPS) model for IIoT environments using hybridized framework | |
| Mishra et al. | Anomaly-based IDS to detect attack using various artificial intelligence & machine learning algorithms: a review | |
| GUPTA et al. | Smart Defense: AI-Powered Adaptive IDs for Real-Time Zero-Day Threat Mitigation." | |
| Garg et al. | Analysis of machine learning algorithms for IoT botnet | |
| Chatterjee et al. | Multi-stage intrusion detection system aided by grey wolf optimization algorithm | |
| Jones et al. | Optimized decision trees to detect iot malware | |
| Nair | Hybrid deep learning framework-based intrusion detection system for the internet of things | |
| Niranjan et al. | Security in data mining-a comprehensive survey | |
| Saboori et al. | Automatic firewall rules generator for anomaly detection systems with Apriori algorithm | |
| Pallaprolu et al. | Zero-day attack identification in streaming data using semantics and Spark | |
| AlEroud et al. | Beyond data: Contextual information fusion for cyber security analytics | |
| Bhargava et al. | A comprehensive study of IoT security risks in building a secure smart city | |
| Nandal et al. | Cyber security against ddos malware spoofing attacks using machine learning with genetic algorithm | |
| Nagle et al. | Feature Extraction Based Classification Technique for Intrusion Detection System |