Research Article Open Access

Preliminary Analysis of Malware Detection in Opcode Sequences within IoT Environment

Firas Shihab Ahmed1, Norwati Mustapha1, Aida Mustapha2, Mohsen Kakavand3 and Cik Feresa Mohd Foozy2
  • 1 Universiti Putra Malaysia, Malaysia
  • 2 Universiti Tun Hussein Onn Malaysia, Malaysia
  • 3 Sunway University, Malaysia

Abstract

With the technological development and means of communication, the Internet of Things (IoT) has become an essential role in providing many services in daily life through millions of heterogeneous but interconnected devices and nodes. This development is opening to many security and privacy challenges that can cause complete network breakdown, bypassed access control or the loss of critical data. This paper attempts to provide a preliminary analysis for malware detection within data generated by IoT-based devices and services in the form of operational codes (Opcode) sequences. Three machine learning algorithms are evaluated and compared for accuracy, precision, recall and F-measure. The results showed that the Random Forest (RF) achieved the best accuracy of 98%, followed by SVM and k-NN, both with 91%. The results are further analyzed based on the Receiver Operating Characteristic (ROC) curve and Precision-Recall curve to further illustrate the difference in performance of all three algorithms when dealing with IoT data.

Journal of Computer Science
Volume 16 No. 9, 2020, 1306-1318

DOI: https://doi.org/10.3844/jcssp.2020.1306.1318

Submitted On: 28 June 2020 Published On: 5 October 2020

How to Cite: Ahmed, F. S., Mustapha, N., Mustapha, A., Kakavand, M. & Foozy, C. F. M. (2020). Preliminary Analysis of Malware Detection in Opcode Sequences within IoT Environment. Journal of Computer Science, 16(9), 1306-1318. https://doi.org/10.3844/jcssp.2020.1306.1318

  • 3,468 Views
  • 1,343 Downloads
  • 18 Citations

Download

Keywords

  • Machine Learning
  • Malware Detection
  • Operation Codes