A Model for Detection of Malwares on Edge Devices
Abstract- Malware detection is a significant challenge in today's digital landscape. As new forms of malware are continuously being developed, traditional detection techniques often fall short due to their inability to detect these new strains. This paperintroduces meaningful features that effectively capture various types of malware, including viruses, worms, Trojans and Ransomware on Edge devices. The paper used a model that implemented Random forest classifier for feature selection and a support vector machine (SVM) model for Malware detection. Object-Oriented Analysis and Design (OOAD) methodology was used to as the design methodology, which involved identifying and modeling the different components of the system and their interactions. The system was developed using Python programming language, with an emphasis on model deployment via Python Flask for web-based testing and execution. The experimental results demonstrate the effectiveness of the proposed systems when compared with other existing system. The result gotten from proposed system is better than that of the existing system by achieving a detection accuracy of 99.98% which is better than existing techniques. This dissertation presents a promising direction for improving malware detection using support vector machine (SVM) model and highlights the potential for collaborative learning approaches to overcome the challenges of traditional centralized approaches. This result simulates edge device that performs malware detection. It measures the latency for each detection and prints whether the latency is high or low. After the simulation, it plots a graph to visualize the latency over multiple requests. Which shows that the proposed model had low latency between 0.25secs to 0.15 secs on multiple requests.
Baptista, I. S., Shiaeles, & N. Kolokotronis, (2019). “A novel malware detection system based on machine learning and binary visualization, 1–6.
Cheng, J., Wong, S. H., Yang, H., & Lu, S. (2007). Smartsiren: virus detection and alert for smartphones. In: Proceedings of the 5th international conference on Mobile systems, applications and services. 258–271
Dovom, E. M., Azmoodeh, A., Dehghantanha, A., Newton, D. E., Parizi, R. M., & Karimipour, H. (2019). Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit., 97, 1–7.
Eichelberg, M., Kleber, K., & Kämmerer, M. (2020). Cybersecurity in pacs and medical imaging: an overview. Journal of Digital Imaging, 33(6), 1527-1542. https://doi.org/10.1007/s10278-020-00393-3
Fabricio, M. (2019). Data Science. IEEE Intelligent System, 34.
Elgabry, M., Nesbeth, D., & Johnson, S. (2020). A systematic review protocol for crime trends facilitated by synthetic biology. Systematic Reviews, 9(1). https://doi.org/10.1186/s13643-020-1284-1
Hsu, R. H., Wang, Y. C., Fan, C. I., Sun, B., Ban, T., Takahashi, T., ... & Kao, S. W. (2020). A privacy-preserving federated learning system for android malware detection based on edge computing. In 2020 15th Asia Joint Conference on Information Security (AsiaJCIS) (128-136).
Iyas, Zhong, Yu, Guoming (2022). “Illuminating Malware Byte Codes with Images for Malware Classification”. IEEE Access 438-451
Khan, M., & Algarni, F. (2020). A Healthcare Monitoring System for the Diagnosis of Heart Disease in the IoMT Cloud Environment Using MSSO-ANFIS. IEEE Access 122259–122269.
Kim, H. L., Nguyen, M. H., Tran, T. D., & Tran, N. D. IMIDS: (2022). An Intelligent Intrusion Detection System against Cyber Threats in IoT. Electronics 11, 524.
King, Z., Henshel, D., Flora, L., Cains, M., Hoffman, B., & Sample, C. (2018). Characterizing and measuring maliciousness for cybersecurity risk assessment. Frontiers in Psychology, 9. https://doi.org/10.3389/fpsyg.2018.00039
Moore, W. and Frye, S. (2019). Review of hipaa, part 2: limitations, rights, violations, and role for the imaging technologist. Journal of Nuclear Medicine Technology, 48(1), 17-23. https://doi.org/10.2967/jnmt.119.227827
Niharika Sharma, A., & Sahay, S. K. (2021). An effective approach for classification of advanced malware with high accuracy. arXiv:1606.06897.
Onyedeke, O. C., Taoufik, E., Okoronkwo, M., Ihedioha, C., & Ugwuishiwu, H. (2020). “Signature based network intrusion detection system using feature selection on android,” International Journal of Advanced Computer Science and Applications.
Pedreira, V., Barros, D., & Pinto, P. (2021). A review of attacks, vulnerabilities, and defenses in industry 4.0 with new challenges on data sovereignty ahead. Sensors, 21(15), 5189. https://doi.org/10.3390/s21155189
Patil, D. B., & Joshi, M. (2012). “A study of past, present computer virus performance of selected security tools,” Southern Economist
Sharma, R., Challa, & Sahay, S. (2017). Detection of Advanced Malware by Machine Learning Techniques: Proceedings of SoCTA, 333–342.
Singhal & Raul (2015). “Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks”
Syam & Vankata (2017). “Detection way where a virtual analyst was developed by using Artificial Intelligence”.
Taylor Onate, Ezekiel & Sako (2021). A Deep Learning Based Approach for Malware Detection and Classification. ISSN-2347-4890.
Zhang, J., Li, G., Marshall, A., Hu, A., & Hanzo, L. (2020). A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels. IEEE Access 138406–138446.
Copyright (c) 2024 International Journal of Engineering and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.