Proceedings of the 6th International Conference on Intelligent Computing (ICIC-6 2023)

IoT Device Malware Detection Using Soft Computing Learning and Wide Madaline (WML-IOT)

Authors
A. Punidha1, *, E. Arul2, E. Yuvarani3
1Dept of Computer Science and Engineering, Coimbatore Institute of Technology, Coimbatore, India
2Dept of Information Technology, Coimbatore Institute of Technology, Coimbatore, India
3Department Master of Computer Application, SNS College of Technology, Coimbatore, Tamilnadu, India
*Corresponding author. Email: punitulip@gmail.com
Corresponding Author
A. Punidha
Available Online 17 October 2023.
DOI
10.2991/978-94-6463-250-7_7How to use a DOI?
Keywords
Internet - of - things; Firmware; API calls; Adaline; Madaline Learning; Backdoors; Malware
Abstract

IoT device manufacturers use backdoors, which are covert control techniques, to make their products supportable. But the front window is really for the hackers. Nevertheless, a firmware is installed to lock the back door once the back door has been located. For hackers, these backdoors serve as either a user ID or a password. These malware operate by wiping out the memory of an IoT device, wiping out firewall rules, wiping out network configuration, and stopping the device. It's as damaging as it can be without frying the circuits of the IoT device. For recovery, victims must manually reinstall the system firmware, which is too challenging for most device owners to complete.Many owners of IoT devices should probably discard them because they think they have experienced a hardware failure, not realising that malware has infected them. A firmware attack like this on IoT devices is classified using Wide (Deep) Madaline Learning (WML). A single output unit is labelled malicious or benign by training a Wide Madaline with numerous input clusters that have a malicious or benign API. Then, using broad Madaline learning, this was trained to find a malicious pattern in unidentified IoT firmware. The results show that various IoT device firmware attacks were classified with 97.24% True Positives and 0.07% False Positives.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 6th International Conference on Intelligent Computing (ICIC-6 2023)
Series
Advances in Computer Science Research
Publication Date
17 October 2023
ISBN
10.2991/978-94-6463-250-7_7
ISSN
2352-538X
DOI
10.2991/978-94-6463-250-7_7How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - A. Punidha
AU  - E. Arul
AU  - E. Yuvarani
PY  - 2023
DA  - 2023/10/17
TI  - IoT Device Malware Detection Using Soft Computing Learning and Wide Madaline (WML-IOT)
BT  - Proceedings of the 6th International Conference on Intelligent Computing (ICIC-6 2023)
PB  - Atlantis Press
SP  - 32
EP  - 36
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-250-7_7
DO  - 10.2991/978-94-6463-250-7_7
ID  - Punidha2023
ER  -