Skip to main content
Log in

A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is the recent digital trend that connects the physical and virtual world. The strong bonding between the people, objects, machines and the web are assisting to develop new business models and also ensuring a better communication framework. On the other side, IoT devices are the main targets for cybercriminals that take vulnerable action over the authentication model, outdated data services and the malware. Henceforth, the security metrics of IoT devices is explored by several researchers while focusing on IoT malware. Many studies on the security issues for IoT systems are explored. Specifically, the employment of Machine learning techniques used for detecting the IoT malwares is studied. In this paper, a detailed survey on detecting the IoT malware using ML techniques are presented. Initially, the fundamentals of the malware analysis and the process and tools used to identify the malwares are discussed. The main intention of this survey is to support the security analysts who are interested to understand and innovate new trends in ML for IoT devices. This study is categorized into two groups, namely, machine learning techniques and neural networks. Both the groups are reviewed from the aspects of preprocessing and feature extraction process of the suggested ML techniques. The study ends the research issues in this field from the aspects of evaluating the performance of methods, as dataset collection, parameter optimization, neural network structure, throughput and scalability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Data Availability

Data sharing not applicable – no new data generated.

Code Availability

Custom code.

References

  1. Koppula, S., & Muthukuru, J. (2016). Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things. International Journal of Electrical and Computer Engineering, 6(3), 1002.

    Google Scholar 

  2. Su, X., Wang, Z., Liu, X., Choi, C., & Choi, D. (2018). Study to improve security for IoT smart device controller: Drawbacks and countermeasures. Security and Communication Networks, 2018, 1–4.

    Google Scholar 

  3. Alizai, Z. A., Tareen, N. F., & Jadoon, I. (2018, September). Improved IoT device authentication scheme using device capability and digital signatures. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 1–5). IEEE.

  4. Farooq, Hasan, Baig, & Shehzad, U. N. U. I. N. (2019). Efficient adaptive framework for securing the internet of things devices. EURASIP Journal on Wireless Communications and Networking, 2019(1), 210.

    Article  Google Scholar 

  5. Henriques, M. S., & Vernekar, N. K. (2017, May). Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In 2017 International Conference on IoT and Application (ICIOT) (pp. 1–4). IEEE.

  6. Rajesh, S., Paul, V., Menon, V. G., & Khosravi, M. R. (2019). A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry, 11(2), 293.

    Article  Google Scholar 

  7. Malina, L., Hajny, J., Fujdiak, R., & Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the internet of things. Computer Networks, 102, 83–95.

    Article  Google Scholar 

  8. Hammi, M. T., Hammi, B., Bellot, P., & Serhrouchni, A. (2018). Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126–142.

    Article  Google Scholar 

  9. P. Pabitha, J. Chandra Priya, R. Praveen, S. Jagatheswari. (2023). ModChain: a hybridized secure and scaling blockchain framework for IoT environment. International Journal of Information Technology, 15(3), 1741-1754. https://doi.org/10.1007/s41870-023-01218-6

  10. Ramalingam, P., & Pabitha, P. (2022). Cryptanalysis of biometric based secure user authentication protocol for IoT applications. In 2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4) (pp. 1–6). IEEE.

  11. Sudhakar, T., Ramalingam, P., & Jagatheswari, S. (2022). An improved proxy-vehicle based authentication scheme for vehicular ad-hoc networks. International Journal of Information Technology, 14(5), 2441–2449. https://doi.org/10.1007/s41870-022-00938-5

  12. Dang, T. K., Pham, C. D., & Nguyen, T. L. (2020). A pragmatic elliptic curve cryptography-based extension for energy-efficient device-to-device communications in smart cities. Sustainable Cities and Society, 56, 102097.

    Article  Google Scholar 

  13. Suárez-Albela, M., Fraga-Lamas, P., & Fernández-Caramés, T. M. (2018). A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices. Sensors (Basel, Switzerland), 18(11), 3868.

    Article  Google Scholar 

  14. Capossele, A., Cervo, V., De Cicco, G., & Petrioli, C. (2015, June). Security as a CoAP resource: an optimized DTLS implementation for the IoT. In 2015 IEEE international conference on communications (ICC) (pp. 549–554). IEEE.

  15. Praveen, Ramalingam & P. Pabitha. (2023). ASK-RAM-IMOT: Autonomous Shared Keys based Remote Authentication Method for Internet of Medical Things Applications. Wireless Personal Communications, 131(1), 273–293. https://doi.org/10.1007/s11277-023-10428-x

  16. Praveen, R., & Pabitha, P. (2023). Improved Gentry–Halevi’s fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things. Transactions on Emerging Telecommunications Technologies, 34(4), https://doi.org/10.1002/ett.v34.4.10.1002/ett.4732

  17. Praveen, R., & Pabitha, P. (2023). A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications. Journal of Intelligent & Fuzzy Systems, 44(5), 7523–7542. https://doi.org/10.3233/JIFS-223617

    Article  Google Scholar 

  18. Das, A. K., Wazid, M., Yannam, A. R., Rodrigues, J. J., & Park, Y. (2019). Provably secure ECC-based device access control and key agreement protocol for IoT environment. Ieee Access : Practical Innovations, Open Solutions, 7, 55382–55397.

    Article  Google Scholar 

  19. Li, W. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering, 2014, 240217.

    Article  Google Scholar 

  20. Ahmed, M. M. (2018). An Optimized K-Nearest Neighbor Algorithm for Extending Wireless Sensor Network Lifetime. International Conference on Advanced Machine Learning Technologies and Applications. Springer, Cham.

  21. Azmoodeh, A. (2017). Detecting crypto-ransomware in iot networks based on energy consumption footprint. Journal of Ambient Intelligence and Humanized Computing, 9, 1141–1152.

    Article  Google Scholar 

  22. Peng, Y. (2016). “An iterative weighted KNN (IW-KNN) based indoor localization method in bluetooth low energy (BLE) environment.“ Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Intl IEEE Conferences. IEEE, 2016.

  23. Whitehouse, K. The design of calamari: an ad-hoc localization system for sensor networks (Doctoral dissertation, Master’s thesis, University of California at Berkeley).

  24. Kwon, Y., Mechitov, K., Sundresh, S., Kim, W., & Agha, G. (Resilient localization for sensor netwoks in outdoor environments. InDistributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on 2005). Jun 10 (pp. 643–652). IEEE.

  25. Tran, D. A. (2008). Localization in wireless sensor networks based on support vector machines. IEEE Transactions on Parallel and Distributed Systems, 19(7), 981–994.

    Article  Google Scholar 

  26. Zhang, Y., Meratnia, N., & Havinga, P. J. (2013). Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine. Ad hoc networks, 11(3), 1062–1074.

    Article  Google Scholar 

  27. Ham, H. S., Kim, H. H., Kim, M. S., & Choi, M. J. (2014). Linear SVM-based android malware detection for reliable IoT services. Journal of Applied Mathematics., 2014, 594501.

    Article  Google Scholar 

  28. Srinivas, M.S., & Rao Emani, B. B. (2017) Epilepsy Seizure Detection using IoT and Support Vector Machine with spline

  29. Lau, Bill, C. P., Eden, W. M., Ma, Tommy, W. S., & Chow (2014). Probabilistic fault detector for wireless sensor network. Expert Systems with Applications, 41(8), 3703–3711.

    Article  Google Scholar 

  30. Shinde, T. A., Jayashree, R., & Prasad (2017). IoT based Animal Health Monitoring with Naive Bayes Classification   IJETT 1.2.

  31. Jogarah, K. K., et al. (2018). Hybrid machine learning algorithms for fault detection in android smartphones. Transactions on Emerging Telecommunications Technologies, 29(2), e3272.

    Article  Google Scholar 

  32. Cheng, X., et al. (2010). Hierarchical distributed data classification in wireless sensor networks. Computer Communications, 33(12), 1404–1413.

    Article  Google Scholar 

  33. Edwards-Murphy, F., et al. (2016). B + WSN: Smart beehive with preliminary decision tree analysis for agriculture and honey bee health monitoring. Computers and Electronics in Agriculture, 124, 211–219.

    Article  Google Scholar 

  34. Yang, J. (2017). Botanical internet of things: Toward smart indoor farming by connecting people, plant, data and clouds. Mobile Networks and Applications, 23, 188–202.

    Article  Google Scholar 

  35. Ilapakurti, A., Vuppalapati C. (2015) Building an IoT framework for connected dairy. Big Data Computing Service and Applications (BigDataService), 2015 IEEE First International Conference on IEEE.

  36. Xiao-Mei, L., & Yong, Q. (2019) Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things. In 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) (pp. 1717–1720). IEEE.

  37. Fiore, U., Palmieri, F., Castiglione, A., & De Santis, A. (2013). Network anomaly detection with the restricted Boltzmann machine. Neurocomputing, 122, 13–23.

    Article  Google Scholar 

  38. Gao, N., Gao, L., Gao, Q., & Wang, H. (2014). An intrusion detection model based on deep belief networks. In Proc. of IEEE International Conference on Advanced Cloud and Big Data, 247–252.

  39. Alom, Z., Bontupalli, V., & Taha, T. M. (2015). Intrusion detection using deep belief networks. In Proc. of IEEE NAECON, 339–344.

  40. Ding, Y., Chen, S., & Xu, J. (2016). Application of deep belief networks for opcode based malware detection. In Proc. of IJCNN, 3901–3908.

  41. Erfani, S. M., Rajasegarar, S., Karunasekera, S., & Leckie, C. (2016). High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition, 58, 121–134.

    Article  Google Scholar 

  42. Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PloS ONE, 11, 1–17.

    MathSciNet  Google Scholar 

  43. Zhang, H., Li, Y., Lv, Z., Sangaiah, A. K., & Huang, T. (2020). A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica, 7, 790–799.

    Article  Google Scholar 

  44. Qu, F., Zhang, J., Shao, Z., & Qi, S. (2017). An intrusion detection model based on deep belief network. In Proc. of ICNCC, 97–101.

  45. Huda, S., Miah, S., Yearwood, J., & Alyahya, S. (2018). A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network. Journal of Parallel and Distributed Computing, 120, 23–31.

    Article  Google Scholar 

  46. Gondalia, A., Dixit, D., Parashar, S., Raghava, V., Sengupta, A., & Sarobin, V. R. (2018). IoT-based Healthcare Monitoring System for War Soldiers using machine learning. Procedia computer science, 133, 1005–1013.

    Article  Google Scholar 

  47. Dawoud, A., Shahristani, S., & Raun, C. (2018). Deep learning and software-defined networks: Towards secure IoT architecture. Internet of Things, 3, 82–89.

    Article  Google Scholar 

  48. Sarker, I. H. (2019). A machine learning based robust prediction model for real-life mobile phone data. Internet of Things, 5, 180–193.

    Article  Google Scholar 

  49. Zolanvari, M., Teixeira, M. A., Gupta, L., Khan, K. M., & Jain, R. (2019). Machine learning based network vulnerability analysis of industrial internet of things. IEEE Internet of Things Journal, 6(4), 6822–6834.

    Article  Google Scholar 

  50. Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. (2019). Attack and anomaly detection in iot sensors in iot sites using machine learning approaches. Internet of Things, 7, 100059.

    Article  Google Scholar 

  51. McGinthy, J. M., Wong, L. J., & Michaels, A. J. (2019). Groundwork for neural network-based specific Emitter Identification Authentication for IoT. IEEE Internet of Things Journal, 6(4), 6429–6440.

    Article  Google Scholar 

  52. Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and privacy: The case study of a smart home, in: IEEE international conference on pervasive computing and communications workshops (PerCom workshops), IEEE, 2017, pp. 618–623.

  53. Kavitha, S., Alphonse, P. J. A., & Reddy, Y. V. (2019). An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for IoT health care system. Journal of medical systems, 43, 1–6.

    Article  Google Scholar 

  54. Mariappan, R., Manjunath, L., Ramachandran, G., Porkodi, M., & Sheela, T. (2022). Super Artificial Intelligence Medical Care Systems with IoT Wireless Sensor. In 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE) (pp. 1–4). IEEE.

    Google Scholar 

  55. Dedeoglu, V., Jurdak, R., Dorri, A., Lunardi, R., Michelin, R., Zorzo, A., & Kanhere, S. (2020). Blockchain technologies for iot (pp. 55–89). In: Advanced Applications of Blockchain Technology, Springer.

Download references

Funding

There is no funding received for this research work.

Author information

Authors and Affiliations

Authors

Contributions

Sasikala has written the abstract, introduction, literature review and, Sengathir identified the research gaps with complete review of the manuscript.

Corresponding author

Correspondence to Sengathir Janakiraman.

Ethics declarations

Conflict of interest

The authors declare that there is no competing interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sasikala, S., Janakiraman, S. A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments. Wireless Pers Commun 132, 1961–1974 (2023). https://doi.org/10.1007/s11277-023-10693-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10693-w

Keywords

Navigation