{"id":"https://openalex.org/W4313315971","doi":"https://doi.org/10.1109/commnet56067.2022.9993956","title":"Static Classification of IoT Malware using Grayscale Image Representation and Lightweight Convolutional Neural Networks","display_name":"Static Classification of IoT Malware using Grayscale Image Representation and Lightweight Convolutional Neural Networks","publication_year":2022,"publication_date":"2022-12-12","ids":{"openalex":"https://openalex.org/W4313315971","doi":"https://doi.org/10.1109/commnet56067.2022.9993956"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet56067.2022.9993956","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065106135","display_name":"Hichem Belguendouz","orcid":null},"institutions":[{"id":"https://openalex.org/I137407579","display_name":"Universit\u00e9 Oran 1 Ahmed Ben Bella","ror":"https://ror.org/059et2b68","country_code":"DZ","type":"education","lineage":["https://openalex.org/I137407579"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Hichem Belguendouz","raw_affiliation_strings":["LITIO Laboratory Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella,Oran,Algeria,31000"],"affiliations":[{"raw_affiliation_string":"LITIO Laboratory Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella,Oran,Algeria,31000","institution_ids":["https://openalex.org/I137407579"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055672093","display_name":"Hachem Guerid","orcid":null},"institutions":[{"id":"https://openalex.org/I137407579","display_name":"Universit\u00e9 Oran 1 Ahmed Ben Bella","ror":"https://ror.org/059et2b68","country_code":"DZ","type":"education","lineage":["https://openalex.org/I137407579"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Hachem Guerid","raw_affiliation_strings":["LITIO Laboratory Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella,Oran,Algeria,31000"],"affiliations":[{"raw_affiliation_string":"LITIO Laboratory Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella,Oran,Algeria,31000","institution_ids":["https://openalex.org/I137407579"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052013167","display_name":"Mejdi Kaddour","orcid":"https://orcid.org/0000-0002-0682-5754"},"institutions":[{"id":"https://openalex.org/I137407579","display_name":"Universit\u00e9 Oran 1 Ahmed Ben Bella","ror":"https://ror.org/059et2b68","country_code":"DZ","type":"education","lineage":["https://openalex.org/I137407579"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Mejdi Kaddour","raw_affiliation_strings":["LITIO Laboratory Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella,Oran,Algeria,31000"],"affiliations":[{"raw_affiliation_string":"LITIO Laboratory Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella,Oran,Algeria,31000","institution_ids":["https://openalex.org/I137407579"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.201,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.305357,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":60,"max":70},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9765,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.4864235}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8741976},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8633045},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7394077},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.56264967},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5598198},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.5592367},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.55481017},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.4864235},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4545216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45439792},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.36939973},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33260503},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28092742},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13314584},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.10884109},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet56067.2022.9993956","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2514847810","https://openalex.org/W2531409750","https://openalex.org/W2733765803","https://openalex.org/W2783348159","https://openalex.org/W2787211780","https://openalex.org/W2791258732","https://openalex.org/W2794801050","https://openalex.org/W2795033129","https://openalex.org/W2796394805","https://openalex.org/W2962802821","https://openalex.org/W3097625942","https://openalex.org/W3172909833"],"related_works":["https://openalex.org/W576517958","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2765763546","https://openalex.org/W2753240997","https://openalex.org/W2360429410","https://openalex.org/W2134884691","https://openalex.org/W2097492617","https://openalex.org/W1764168690","https://openalex.org/W115686965"],"abstract_inverted_index":{"The":[0,61],"widespread":[1],"of":[2,5,37,44,63,72,79,98,133,137,149,158],"the":[3,42,70,77,96,147],"Internet":[4,46],"Things":[6],"(IoT)":[7],"has":[8,24,86],"made":[9],"it":[10],"a":[11,33,55,129,141,150,156],"good":[12],"target":[13],"for":[14],"adversaries":[15],"to":[16,69,103,167],"carry":[17],"out":[18,53],"sophisticated":[19],"cyberattacks.":[20],"A":[21],"critical":[22],"point":[23],"been":[25,87],"reached":[26],"in":[27,30,113,146],"IoT":[28,57,108],"security":[29,101],"2016":[31],"through":[32],"major":[34],"distributed":[35],"denial":[36],"service":[38,47],"attack":[39],"that":[40],"disturbed":[41],"operation":[43],"large":[45],"providers":[48],"and":[49,76],"online":[50,67],"services,":[51],"carried":[52],"by":[54,183],"new":[56,73,142],"malware":[58,74,99,109,130,138,162,171],"named":[59],"Mirai.":[60],"release":[62],"its":[64,114],"source":[65],"code":[66],"led":[68],"emergence":[71],"types":[75],"reemergence":[78],"old":[80],"ones":[81],"such":[82],"as":[83,116],"Gafgyt":[84],"who":[85],"around":[88],"since":[89],"2014.":[90],"In":[91,124],"this":[92,125],"context,":[93],"quickly":[94],"identifying":[95],"family":[97],"enables":[100],"professionals":[102],"apply":[104],"suitable":[105],"countermeasures.":[106],"However,":[107],"classification":[110,118,131],"is":[111],"still":[112],"infancy":[115],"most":[117],"approaches":[119],"require":[120],"some":[121],"domain":[122],"expertise.":[123],"work,":[126],"we":[127,164],"propose":[128],"approach":[132,177],"grayscale":[134],"image":[135],"representation":[136],"binaries":[139],"using":[140],"machine":[143],"learning":[144],"model":[145],"form":[148],"lightweight":[151],"convolutional":[152],"neural":[153],"network.":[154],"Using":[155],"dataset":[157],"more":[159,184],"than":[160,185],"89,000":[161],"samples,":[163],"were":[165],"able":[166],"predict":[168],"correctly":[169],"9":[170],"classes":[172],"with":[173],"95%":[174],"accuracy.":[175],"Our":[176],"outperforms":[178],"other":[179],"evaluated":[180],"CNN-based":[181],"classifiers":[182],"4%.":[186]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4313315971","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-01-21T12:49:38.578080","created_date":"2023-01-06"}