Proceedings of the 6th International Conference on Intelligent Computing (ICIC-6 2023)

Firmware Attack Detection Using Logistic Regression (FAD-LR)

Authors
A. Punidha1, *, E. Arul2, E. Yuvarani3
1Dept of Computer Science and Engineering, Coimbatore Institute of Technology, Coimbatore, India
2Dept of Information Technology, Coimbatore Institute of Technology, Coimbatore, India
3Department Master of Computer Application, SNS College of Technology, Coimbatore, Tamilnadu, India
*Corresponding author. Email: punitulip@gmail.com
Corresponding Author
A. Punidha
Available Online 17 October 2023.
DOI
10.2991/978-94-6463-250-7_8How to use a DOI?
Keywords
Internet - of - Things; Firmware; API calls; Logistic Regressionm; Machine Learning; Backdoors; Malware
Abstract

The smart devices, commonly referred to as IoT devices, are experiencing a significant surge in demand and are becoming increasingly integrated into our daily lives. Cyber felons perceive monetary potential, thereby intensifying and setting apart their assaults. One of the risks faced by IoT device enthusiasts is that threats can arise unexpectedly, and seemingly harmless methods can turn into powerful tools for illegal activities. Possible paraphrased text: - Crypto currency could be subject to hostile withdrawals, DDoS attacks, or botnet schemes that expose computers to harm. - Perils for crypto currency users may include malicious withdrawals, DDoS assaults, or botnets that exploit vulnerabilities in computer systems. - Risks to cryptocurrencies could entail malevolent withdrawals, DDoS offensives, or botnet activities that expose devices to compromise. - Threats to digital coins might involve harmful withdrawals, DDoS attacks, or botnet campaigns that compromise the security of computers. - Challenges facing virtual currency could involve malicious withdrawals, DDoS strikes, or botnet activities that compromise the confidentiality of computing devices. Once the IoT system belonging to the victim is infiltrated, the malwares seize command of the device and engage in malevolent actions. In this paper, the LR classification technique is suggested to cluster IoT app service calls to kernel API calls that are related to network. By utilizing LR, the pool network connected unidentified executable API calls that executed malicious activities specifically targeting IoT devices. After setting up the IoT kernel’s network of API calls, a LR algorithm was utilized to identify the closest association to the harmful behavior. The study involved evaluating 1621 malware specimens, derived from diverse sources and representing all malware groups, yielding an optimistic precision rating of 99.39% and a false positive rate of 0.1%.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 6th International Conference on Intelligent Computing (ICIC-6 2023)
Series
Advances in Computer Science Research
Publication Date
17 October 2023
ISBN
10.2991/978-94-6463-250-7_8
ISSN
2352-538X
DOI
10.2991/978-94-6463-250-7_8How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - A. Punidha
AU  - E. Arul
AU  - E. Yuvarani
PY  - 2023
DA  - 2023/10/17
TI  - Firmware Attack Detection Using Logistic Regression (FAD-LR)
BT  - Proceedings of the 6th International Conference on Intelligent Computing (ICIC-6 2023)
PB  - Atlantis Press
SP  - 37
EP  - 41
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-250-7_8
DO  - 10.2991/978-94-6463-250-7_8
ID  - Punidha2023
ER  -