[go: up one dir, main page]

Omar, 2023 - Google Patents

Harnessing the power of decision trees to detect IoT malware

Omar, 2023

View PDF
Document ID
15669248181164798774
Author
Omar M
Publication year
Publication venue
arXiv preprint arXiv:2301.12039

External Links

Snippet

Due to its simple installation and connectivity, the Internet of Things (IoT) is susceptible to malware attacks. Being able to operate autonomously. As IoT devices have become more prevalent, they have become the most tempting targets for malware. Weak, guessable, or …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Guezzaz et al. A reliable network intrusion detection approach using decision tree with enhanced data quality
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Bhatia et al. A comparative study on various intrusion detection techniques using machine learning and neural network
Vinchurkar et al. A review of intrusion detection system using neural network and machine learning
Reddy Neural networks for intrusion detection and its applications
Babu et al. A survey on attack detection methods for iot using machine learning and deep learning
Omar Harnessing the power of decision trees to detect IoT malware
Ju et al. Hetemsd: A big data analytics framework for targeted cyber‐attacks detection using heterogeneous multisource data
Sharma et al. Layered approach for intrusion detection using naïve Bayes classifier
Devprasad et al. Context adaptive ensemble classification mechanism with multi‐criteria decision making for network intrusion detection
Shankar et al. Deep analysis of risks and recent trends towards network intrusion detection system
Srinivasan et al. Intrusion detection and prevention system (IDPS) model for IIoT environments using hybridized framework
Mishra et al. Anomaly-based IDS to detect attack using various artificial intelligence & machine learning algorithms: a review
GUPTA et al. Smart Defense: AI-Powered Adaptive IDs for Real-Time Zero-Day Threat Mitigation."
Garg et al. Analysis of machine learning algorithms for IoT botnet
Chatterjee et al. Multi-stage intrusion detection system aided by grey wolf optimization algorithm
Jones et al. Optimized decision trees to detect iot malware
Nair Hybrid deep learning framework-based intrusion detection system for the internet of things
Niranjan et al. Security in data mining-a comprehensive survey
Saboori et al. Automatic firewall rules generator for anomaly detection systems with Apriori algorithm
Pallaprolu et al. Zero-day attack identification in streaming data using semantics and Spark
AlEroud et al. Beyond data: Contextual information fusion for cyber security analytics
Bhargava et al. A comprehensive study of IoT security risks in building a secure smart city
Nandal et al. Cyber security against ddos malware spoofing attacks using machine learning with genetic algorithm
Nagle et al. Feature Extraction Based Classification Technique for Intrusion Detection System