Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Abstract
:1. Introduction
- To systematically identify the common threats on smart homes;
- To analyze the methods used to detect these threats.
- Providing an in-depth understanding of the current machine learning methods used to detect malware in smart home environments;
- Supporting researchers in developing user-centric preventive measures, as users are often considered the weakest link in cyber security;
- Encouraging researchers to dedicate their efforts to improving the security of smart homes and actively contributing to the United Nations’ Sustainable Development Goal 11 in order to promote global sustainability.
2. Problem Statement
- RQ1: What are the common cyber threats that target smart homes?
- RQ2: What methods are applied in malware detection in smart homes?
- RQ3: How can smart home security be improved?
3. Research Method
- Selection of inclusion and exclusion criteria;
- Search terms and data sources;
- PRISMA flow diagram;
- Bias;
- Data analysis and coding strategy.
3.1. Inclusion and Exclusion Criteria
3.2. Search Terms and Data Sources
- Emerald;
- Science Direct;
- Taylor and Francis;
- ProQuest;
- IEEE explore.
3.3. PRISMA Flow Diagram
3.4. Bias
3.5. Data Analysis and Coding Strategy
4. Results
5. Discussion
5.1. Smart Home Adversarial Threat Model
5.2. What Are the Common Cyber Threats That Target Smart Homes?
5.3. What Methods Are Applied in Malware Detection in Smart Homes?
5.4. How Smart Home Security Can Be Improved?
6. Summary and Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Zorgati, H.; Djemaa, R.B.; Amor, I.A.B. Finding Internet of Things resources: A state-of-the-art study. Data Knowl. Eng. 2022, 140, 102025. [Google Scholar] [CrossRef]
- Huda, N.U.; Ahmed, I.; Adnan, M.; Ali, M.; Naeem, F. Experts and intelligent systems for smart homes’ Transformation to Sustainable Smart Cities: A comprehensive review. Expert Syst. Appl. 2024, 238, 122380. [Google Scholar] [CrossRef]
- Lucido, S.; Hummel, P. Internet of Things and Data Placement|Edge to Core and the Internet of Things|Dell Technologies Info Hub. Available online: https://infohub.delltechnologies.com/en-us/l/edge-to-core-and-the-internet-of-things-2/internet-of-things-and-data-placement/ (accessed on 9 October 2024).
- Tetteh, N.; Amponsah, O. Sustainable adoption of smart homes from the Sub-Saharan African perspective. Sustain. Cities Soc. 2020, 63, 102434. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Chowdhury, N.; Katsikas, S.; Gkioulos, V.; Wolthusen, S. Threat analysis for smart homes. Future Internet 2019, 11, 207. [Google Scholar] [CrossRef]
- Allifah, N.M.; Zualkernan, I.A. Ranking security of IoT-based smart home consumer devices. IEEE Access 2022, 10, 18352–18369. [Google Scholar] [CrossRef]
- Hughes-Lartey, K.; Li, M.; Botchey, F.E.; Qin, Z. Human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon 2021, 7, e06522. [Google Scholar] [CrossRef]
- Zhang, Y.; Malacaria, P.; Loukas, G.; Panaousis, E. CROSS: A framework for cyber risk optimisation in smart homes. Comput. Secur. 2023, 130, 103250. [Google Scholar] [CrossRef]
- Linkov, V.; Zámečník, P.; Havlíčková, D.; Pai, C.W. Human factors in the cybersecurity of autonomous vehicles: Trends in current research. Front. Psychol. 2019, 10, 995. [Google Scholar] [CrossRef]
- Gaber, M.G.; Ahmed, M.; Janicke, H. Malware detection with artificial intelligence: A systematic literature review. ACM Comput. Surv. 2024, 56, 552. [Google Scholar] [CrossRef]
- Palša, J.; Hurtuk, J.; Chovanec, M.; Chovancová, E. Using Machine Learning Algorithms to Detect Malware by Applying Static and Dynamic Analysis Methods. Acta Polytech. Hung. 2022, 19, 177–196. [Google Scholar] [CrossRef]
- Deldar, F.; Abadi, M. Deep learning for zero-day malware detection and classification: A survey. ACM Comput. Surv. 2023, 56, 1–37. [Google Scholar] [CrossRef]
- Kitchenham, B.; Brereton, P.; Li, Z.; Budgen, D.; Burn, A. Repeatability of sys-tematic literature reviews. In Proceedings of the 15th Annual Conference on Evaluation & Assessment in Software Engineering (ease 2011), Durham, UK, 11–12 April 2011. [Google Scholar]
- Dey, R.; Kassim, S.; Maurya, S.; Mahajan, R.A.; Kadia, A.; Singh, M. A Systematic Literature Review on the Islamic Capital Market: Insights Using the PRISMA Approach. J. Electr. Syst. 2024, 20, 730–746. [Google Scholar]
- Buetow, S.; Zawaly, K. Rethinking researcher bias in health research. J. Eval. Clin. Pract. 2022, 28, 843–846. [Google Scholar] [CrossRef] [PubMed]
- Naeem, M.; Ozuem, W.; Howell, K.; Ranfagni, S. A step-by-step process of thematic analysis to develop a conceptual model in qualitative research. Int. J. Qual. Methods 2023, 22, 16094069231205789. [Google Scholar] [CrossRef]
- Proudfoot, K. Inductive/deductive hybrid thematic analysis in mixed methods research. J. Mix. Methods Res. 2023, 17, 308–326. [Google Scholar] [CrossRef]
- Williams, M.; Moser, T. The art of coding and thematic exploration in qualitative research. Int. Manag. Rev. 2019, 15, 45–55. [Google Scholar]
- Makkar, A.; Garg, S.; Kumar, N.; Hossain, M.S.; Ghoneim, A.; Alrashoud, M. An efficient spam detection technique for IoT devices using machine learning. IEEE Trans. Ind. Inform. 2020, 17, 903–912. [Google Scholar] [CrossRef]
- Moustafa, N.; Turnbull, B.; Choo, K.K.R. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 2018, 6, 4815–4830. [Google Scholar] [CrossRef]
- Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 2020, 7, 6882–6897. [Google Scholar] [CrossRef]
- Ge, M.; Fu, X.; Syed, N.; Baig, Z.; Teo, G.; Robles-Kelly, A. Deep learning-based intrusion detection for IoT networks. In Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 1–3 December 2019; pp. 256–25609. [Google Scholar]
- Tabassum, A.; Erbad, A.; Guizani, M. A survey on recent approaches in intrusion detection system in IoTs. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 1190–1197. [Google Scholar]
- Saha, I.; Sarma, D.; Chakma, R.J.; Alam, M.N.; Sultana, A.; Hossain, S. Phishing attacks detection using deep learning approach. In Proceedings of the 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 20–22 August 2020; pp. 1180–1185. [Google Scholar]
- Vasan, D.; Alazab, M.; Venkatraman, S.; Akram, J.; Qin, Z. MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans. Comput. 2020, 69, 1654–1667. [Google Scholar] [CrossRef]
- Khare, S.; Totaro, M. Ensemble learning for detecting attacks and anomalies in iot smart home. In Proceedings of the 2020 3rd international conference on data intelligence and security (ICDIS), South Padre Island, TX, USA, 24–26 June 2020; pp. 56–63. [Google Scholar]
- Maheswaran, N.; Logeswari, G.; Bose, S.; Anitha, T. A critical review on intrusion detection systems in IoT based on ML approach: A Survey. In Proceedings of the 2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), Villupuram, India, 21–22 April 2023; pp. 1–8. [Google Scholar]
- Baviskar, P.V.; Singh, G.; Patil, V.N. Design of Machine Learning-Based Malware Detection Methodologies in the Internet of Things Environment. In Proceedings of the 2023 International Conference for Advancement in Technology (ICONAT), Goa, India, 24–26 January 2023; pp. 1–6. [Google Scholar]
- Adnyana, I.G.; Thalib, E.F.; Harum, M.A.; Nagas, M.A.C.; Jawa, M.W. A Discussion of Malware Attacks Targeting Smart Homes and Connected Devices: Investigating Cybersecurity Risks in Everyday Living. J. Digit. Law Policy 2023, 3, 13–25. [Google Scholar] [CrossRef]
- He, Z.; Miari, T.; Makrani, H.M.; Aliasgari, M.; Homayoun, H.; Sayadi, H. When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection. In Proceedings of the 2021 22nd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 7–9 April 2021; pp. 85–90. [Google Scholar]
- Chhetri, C.; Motti, V. Identifying vulnerabilities in security and privacy of smart home devices. In National Cyber Summit (NCS) Research Track; Springer International Publishing: Basel, Switzerland, 2020; pp. 211–231. [Google Scholar]
- OConnor, T.J.; Jessee, D.; Campos, D. Through the spyglass: Towards iot companion app man-in-the-middle attacks. In Proceedings of the 14th Cyber Security Experimentation and Test Workshop, Virtual, 9 August 2021; pp. 58–62. [Google Scholar]
- Datta, S. Vulnerabilities of smart homes. In Applied Approach to Privacy and Security for the Internet of Things; IGI Global: Hershey, PA, USA, 2020; pp. 216–240. [Google Scholar]
- Sapalo Sicato, J.C.; Sharma, P.K.; Loia, V.; Park, J.H. VPNFilter malware analysis on cyber threat in smart home network. Appl. Sci. 2019, 9, 2763. [Google Scholar] [CrossRef]
- Sharma, O.; Sharma, A.; Kalia, A. Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images. J. Intell. Inf. Syst. 2022, 60, 349–375. [Google Scholar] [CrossRef]
- Gupta, A.; Tyagi, O.; Uniyal, V.; Singhal, S.; Jha, V. A Review on Machine Learning Techniques for DDoS Attack Detection in IoT. In Proceedings of the 2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST), Delhi, India, 9–10 December 2022; pp. 1–6. [Google Scholar]
- Sharma, P. Critical Review of Various Intrusion Detection Techniques for Internet of Things. In Proceedings of the 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India, 28–29 February 2020; pp. 1–6. [Google Scholar]
- Htwe, C.S.; Thant, Y.M.; Thwin, M.M.S. Botnets attack detection using machine learning approach for iot environment. In Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2020; Volume 1646. [Google Scholar]
- Khan, A.R.; Kashif, M.; Jhaveri, R.H.; Raut, R.; Saba, T.; Bahaj, S.A. Deep learning for intrusion detection and security of Internet of things (IoT): Current analysis, challenges, and possible solutions. Secur. Commun. Netw. 2022, 2022, 4016073. [Google Scholar] [CrossRef]
- Alkahtani, H.; Aldhyani, T.H. Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021, 2021, 5579851. [Google Scholar] [CrossRef]
- Wang, C.; Zhao, Z.; Wang, F.; Li, Q. MSAAM: A multiscale adaptive attention module for IoT malware detection and family classification. Secur. Commun. Netw. 2022, 2022, 2206917. [Google Scholar] [CrossRef]
- Vutukuru, S.R.; Lade, S.C. SecureIoT: Novel Machine Learning Algorithms for Detecting and Preventing Attacks on IoT Devices. J. Electr. Syst. 2023, 19, 315–335. [Google Scholar] [CrossRef]
- Zhao, Y.; Kuerban, A. MDABP: A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS. Sensors 2023, 23, 3060. [Google Scholar] [CrossRef]
- Aravamudhan, P. A novel adaptive network intrusion detection system for internet of things. PLoS ONE 2023, 18, e0283725. [Google Scholar] [CrossRef]
- Sharma, S.; Guleria, K.; Tiwari, S.; Kumar, S. A deep learning based convolutional neural network model with VGG16 feature extractor for the detection of Alzheimer Disease using MRI scans. Meas. Sens. 2022, 24, 100506. [Google Scholar] [CrossRef]
- Atitallah, S.B.; Driss, M.; Almomani, I. A novel detection and multi-classification approach for IoT-malware using random forest voting of fine-tuning convolutional neural networks. Sensors 2022, 22, 4302. [Google Scholar] [CrossRef] [PubMed]
- Riaz, S.; Latif, S.; Usman, S.M.; Ullah, S.S.; Algarni, A.D.; Yasin, A.; Anwar, A.; Elmannai, H.; Hussain, S. Malware detection in internet of things (IoT) devices using deep learning. Sensors 2022, 22, 9305. [Google Scholar] [CrossRef] [PubMed]
- Naeem, H.; Alshammari, B.M.; Ullah, F. Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model. Computational Intelligence & Neuroscience. Comput. Intell. Neurosci. 2022. [Google Scholar] [CrossRef]
- Takase, H.; Kobayashi, R.; Kato, M.; Ohmura, R. A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. Int. J. Inf. Secur. 2020, 19, 71–81. [Google Scholar] [CrossRef]
- Panda, P.; CU, O.K.; Marappan, S.; Ma, S.; Veesani Nandi, D. Transfer learning for image-based malware detection for iot. Sensors 2023, 23, 3253. [Google Scholar] [CrossRef]
- D’Angelo, G.; Farsimadan, E.; Ficco, M.; Palmieri, F.; Robustelli, A. Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains. Future Gener. Comput. Syst. 2023, 148, 93–105. [Google Scholar] [CrossRef]
- Schmitt, M. Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection. J. Ind. Inf. Integr. 2023, 36, 100520. [Google Scholar] [CrossRef]
- Chaganti, R.; Ravi, V.; Pham, T.D. Deep learning based cross architecture internet of things malware detection and classification. Comput. Secur. 2022, 120, 102779. [Google Scholar] [CrossRef]
- Lazzarini, R.; Tianfield, H.; Charissis, V. A stacking ensemble of deep learning models for IoT intrusion detection. Knowl.-Based Syst. 2023, 279, 110941. [Google Scholar] [CrossRef]
- Da Costa, K.A.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de Albuquerque, V.H.C. Internet of Things: A survey on machine learning-based intrusion detection approaches. Comput. Netw. 2019, 151, 147–157. [Google Scholar] [CrossRef]
- Rey, V.; Sánchez, P.M.S.; Celdrán, A.H.; Bovet, G. Federated learning for malware detection in IoT devices. Comput. Netw. 2022, 204, 108693. [Google Scholar] [CrossRef]
- Kumar, A.; Lim, T.J. EDIMA: Early detection of IoT malware network activity using machine learning techniques. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 289–294. [Google Scholar]
- Heartfield, R.; Loukas, G.; Bezemskij, A.; Panaousis, E. Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Trans. Inf. Forensics Secur. 2020, 16, 1720–1735. [Google Scholar] [CrossRef]
- Ren, Z.; Wu, H.; Ning, Q.; Hussain, I.; Chen, B. End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 2020, 101, 102098. [Google Scholar] [CrossRef]
- Ahmed, S.; Khan, Z.A.; Mohsin, S.M.; Latif, S.; Aslam, S.; Mujlid, H.; Adil, M.; Najam, Z. Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron. Future Internet 2023, 15, 76. [Google Scholar] [CrossRef]
- Santhosh Kumar, S.V.N.; Selvi, M.; Kannan, A. A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things. Comput. Intell. Neurosci. 2023, 2023, 8981988. [Google Scholar] [CrossRef]
- Dovom, E.M.; Azmoodeh, A.; Dehghantanha, A.; Newton, D.E.; Parizi, R.M.; Karimipour, H. Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 2019, 97, 1–7. [Google Scholar] [CrossRef]
- Golmaryami, M.; Taheri, R.; Pooranian, Z.; Shojafar, M.; Xiao, P. Setti: As elf-supervised adv e rsarial malware de t ection archi t ecture in an i ot environment. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2022, 18, 1–21. [Google Scholar] [CrossRef]
- Han, W.; Xue, J.; Wang, Y.; Liu, Z.; Kong, Z. MalInsight: A systematic profiling based malware detection framework. J. Netw. Comput. Appl. 2019, 125, 236–250. [Google Scholar] [CrossRef]
- Hamza, A.A.; Abdel Halim, I.T.; Sobh, M.A.; Bahaa-Eldin, A.M. HSAS-MD analyzer: A hybrid security analysis system using model-checking technique and deep learning for malware detection in IoT apps. Sensors 2022, 22, 1079. [Google Scholar] [CrossRef]
- Yaokumah, W.; Appati, J.K.; Kumah, D. Machine learning methods for detecting Internet-of-Things (IoT) malware. Int. J. Cogn. Inform. Nat. Intell. (IJCINI) 2021, 15, 1079. [Google Scholar] [CrossRef]
- Ijaz, A.; Khan, A.A.; Arslan, M.; Tanzil, A.; Javed, A.; Khalid, M.A.U.; Khan, S. 2024. Innovative Machine Learning Techniques for Malware Detection. J. Comput. Biomed. Inform. 2024, 7, 403–424. [Google Scholar]
- Ali, S.; Abusabha, O.; Ali, F.; Imran, M.; Abuhmed, T. Effective multitask deep learning for iot malware detection and identification using behavioral traffic analysis. IEEE Trans. Netw. Serv. Manag. 2022, 20, 1199–1209. [Google Scholar] [CrossRef]
- Auliar, R.B.; Bekaroo, G. Security in iot-based smart homes: A taxonomy study of detection methods of mirai malware and countermeasures. In Proceedings of the 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Hilton, Mauritius, 7–8 October 2021; pp. 1–6. [Google Scholar]
- Amru, M.; Kannan, R.J.; Ganesh, E.N.; Muthumarilakshmi, S.; Padmanaban, K.; Jeyapriya, J.; Murugan, S. Network intrusion detection system by applying ensemble model for smart home. Int. J. Electr. Comput. Eng. 2088-8708 2024, 14, 3485–3494. [Google Scholar] [CrossRef]
- Shi, T.; McCann, R.A.; Huang, Y.; Wang, W.; Kong, J. Malware detection for internet of things using one-class classification. Sensors 2024, 24, 4122. [Google Scholar] [CrossRef] [PubMed]
- Yamauchi, M.; Ohsita, Y.; Murata, M.; Ueda, K.; Kato, Y. Anomaly detection in smart home operation from user behaviors and home conditions. IEEE Trans. Consum. Electron. 2020, 66, 183–192. [Google Scholar] [CrossRef]
- Shobana, M.; Poonkuzhali, S. A novel approach to detect IoT malware by system calls using Deep learning techniques. In Proceedings of the 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), Kottayam, India, 13–14 February 2020; pp. 1–5. [Google Scholar]
- El-Ghamry, A.; Gaber, T.; Mohammed, K.K.; Hassanien, A.E. Optimized and efficient image-based IoT malware detection method. Electronics 2023, 12, 708. [Google Scholar] [CrossRef]
- Asam, M.; Khan, S.H.; Akbar, A.; Bibi, S.; Jamal, T.; Khan, A.; Ghafoor, U.; Bhutta, M.R. IoT malware detection architecture using a novel channel boosted and squeezed CNN. Sci. Rep. 2022, 12, 15498. [Google Scholar] [CrossRef]
- Yadav, C.S.; Singh, J.; Yadav, A.; Pattanayak, H.S.; Kumar, R.; Khan, A.A.; Haq, M.A.; Alhussen, A.; Alharby, S. Malware analysis in IoT & android systems with defensive mechanism. Electronics 2022, 11, 2354. [Google Scholar] [CrossRef]
- Jeon, J.; Park, J.H.; Jeong, Y.S. Dynamic analysis for IoT malware detection with convolution neural network model. IEEE Access 2020, 8, 96899–96911. [Google Scholar] [CrossRef]
- Aboaoja, F.A.; Zainal, A.; Ghaleb, F.A.; Al-Rimy, B.A.S.; Eisa, T.A.E.; Elnour, A.A.H. Malware detection issues, challenges, and future directions: A survey. Appl. Sci. 2022, 12, 8482. [Google Scholar] [CrossRef]
- Alrubayyi, H.; Goteng, G.; Jaber, M.; Kelly, J. Challenges of malware detection in the IoT and a review of artificial immune system approaches. J. Sens. Actuator Netw. 2021, 10, 61. [Google Scholar] [CrossRef]
- Popoola, S.I.; Ande, R.; Adebisi, B.; Gui, G.; Hammoudeh, M.; Jogunola, O. Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet Things J. 2021, 9, 3930–3944. [Google Scholar] [CrossRef]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
- Tan, X.; Yang, J.; Rahardja, S. Sparse random projection isolation forest for outlier detection. Pattern Recognit. Lett. 2022, 163, 65–73. [Google Scholar] [CrossRef]
- Yoon, S.; Han, S.; Hwang, E. Joint heterogeneous PUF-based security-enhanced IoT authentication. IEEE Internet Things J. 2023, 10, 18082–18096. [Google Scholar] [CrossRef]
Inclusion | Exclusion |
---|---|
The paper should focus on the machine learning approach to detect an anomaly. | Papers that do not focus on machine learning approaches to detect anomalies. |
The paper should focus on smart homes or IoT environments. | Papers that are not in the context of smart homes or IoT. |
Papers published from 2019 to 2023. | Papers that do not fall within the range of specified publication years. |
The paper should be written in English. | Papers written in languages other than English. |
Author | Year | Technique | Environment | Advantage | Disadvantage |
---|---|---|---|---|---|
[19] | 2021 | An efficient spam detection technique using machine learning | Smart home environments | The proposed approach effectively detects spam parameters affecting IoT devices | Quality of the dataset and the need for continuous updates to the detection algorithms |
[20] | 2019 | This paper proposes an ensemble intrusion detection technique using the AdaBoost ensemble learning method | IoT environment | The proposed technique effectively identifies malicious events by utilizing a set of features derived from MQTT, DNS, and HTTP protocols | The performance of the technique may depend on the quality and quantity of the training data used |
[21] | 2020 | Anomaly-based Intrusion Detection System (IDS) using machine learning techniques | Smart home | Lightweight implementation is suitable for resource-constrained IoT gateways | Assumes the IoT network is not under attack during the training phase, which may not always be the case |
[22] | 2019 | This paper proposes a deep learning-based intrusion detection system using feed-forward neural networks | IoT networks | High classification accuracy for both binary and multi-class classifications | The model shows confusion between certain categories of attacks, particularly reconnaissance and information theft, indicating a need for further refinement |
[23] | 2023 | Machine Learning (ML) and Artificial Intelligence (AI) techniques for Intrusion Detection Systems (IDS) in IoT environments | Internet of Things (IoT) networks, including various applications such as industries, home automation, hospitals, and environmental monitoring | Provides a comprehensive review of IoT layers, communication protocols, and their security issues, emphasizing the necessity of IDS | Current ML-based IDS methods have not been evaluated in real-time specifically for IoTs |
[24] | 2020 | Using deep learning techniques for detecting phishing attacks | IoT networks | Enhanced detection rates of phishing attacks through the application of deep learning | Possible computational resource requirements that could limit implementation in some environments |
[25] | 2020 | Novel cross-architecture MTHAEL (Multi-Task Hierarchical Ensemble Adversarial Learning) | IoT | High accuracy and robustness in detecting obfuscated malware | Lack of practical implementation |
[26] | 2020 | ensemble learning to detect attacks and anomalies | Smart home | Robustness and high accuracy | Computational complexity |
[27] | 2020 | IDS using machine learning | IoT | Structured framework | Implementation complexity |
[28] | 2023 | Malware detection using machine learning | IoT | High accuracy | Resource limitations |
Authors | Threats | Approach |
---|---|---|
[35] | Botnets | Decision tree, K-nearest neighbor, and random forest |
[19] | Spam | Bayesian Generalized Linear Model (BGLM) and boosted linear and eXtreme Gradient Boosting (XGBoost) |
[20] | Exploits and worms | Ensemble learning and statistical flow features |
[21] | Brute force attacks, zero-day attacks, and port scanning attacks | Isolation Forest |
[22] | Probing attacks, denial-of-service attacks, and information theft | Feed-forward neural networks |
[23] | DDoS attacks, ransomware, eavesdropping, and denial-of-service attacks | Machine learning and Signature-based detection |
[24] | Phishing attacks | Feed-forward neural network |
[25] | Malware | Ensemble learning |
[26] | Distributed denial-of-service attacks, data probing, and spying | Ensemble learning |
[27] | Dos, eavesdropping, man-in-the-middle attacks, and routing attacks | Signature-based approaches, specification-based approaches, and machine learning approaches |
[28] | Malware | Isolation Forest and K-means clustering |
[36] | DDos | Machine learning (logistic regression (LR), K-nearest neighbours (KNN), decision trees (DT), support vector machines (SVM), naive bayes, and random forest) and deep learning |
[37] | Physical attacks, malicious code upload, data transmit attacks, and DoS attacks | Machine learning and deep learning |
[38] | Botnets | Classification and Regression Tree (CART) |
[39] | Spoofing, DoS, and probing attacks | Autoencoder and isolation forest |
[40] | Unauthorized access, data breaches, malware attacks, DoS, and network intrusions | Hybrid Convolutional Neural Network with Long Short-Term Memory (CNN-LSTM) |
[41] | Spyware, worms, ransomware, viruses, and crypto miners | CliqueNet model |
[42] | DoS, MiTM, botnet, and information leakage | Federated Ensemble Learning (FEI) and adversarial machine learning |
[43] | DdoS, malware behavior, and network attacks. | K Nearest Neighbor (KNN) |
[44] | Zero-day attacks, DDoS, malware, and data breaches | Fast Region-Based Convolution Neural Network (Fast R-CNN) |
[45] | Malware | Deep CNN and Xception CNN |
[46] | Adware, virus, trojan, worm, and backdoor | Random forest voting of fine-tuning CNN |
[47] | MiTM, DoS, and botnets | CNN and LSTM |
[48] | Adware, spyware, trojans, and rootkits. | CNN-based transfer learning model |
[49] | Malware | Random forest |
[50] | Trojan horse, worms, viruses, spyware, ransomware, and DDoS. | CNN |
[51] | Malware | Federated Markov chains |
[52] | Cybercrime | Logistic Regression (LR), random forest, Gradient Boosting Machine (GBM), and artificial neural networks (ANN) |
[53] | Botnet | Bidirectional-Gated Recurrent Unit-Convolutional Neural Network (Bi-GRU-CNN) |
[54] | Malware, DoS, unauthorized access, data breaches, and network reconnaissance | Shallow Multilayer Perceptron (MLP), Deep Neural Network (DNN), CNN, and LSTM |
[55] | MITM, DDoS, false data injection, intrusion vulnerabilities, zero-day attacks, and routing attacks | Distributed deep learning, Support Vector Machines (SVMs), Extreme Learning Machines (ELMs), Clustering based on Self-Organized Ant Colony Network (CSOACN), and unsupervised Optimum-Path Forest (OPF) classifier. |
[56] | Adversarial setups, data poisoning attacks, model poisoning attacks, and Byzantine adversaries | Federated learning |
[57] | Port scanning and DDoS | NB, DT, and SVM |
[58] | Unauthorized access, data breaches, and malware injection | Reinforcement learning |
[59] | Android malware | CNN and Convolutional Recurrent Neural Network (CRNN) |
[60] | DDoS | Multi-Layer Perceptron (MLP) |
[61] | DoS, sybil attack, selective forwarding attacks, wormhole attacks, blackhole attacks, sinkhole attacks, jamming attacks, and false data injection attacks | Convolutional Neural Network (CNN) |
[62] | DDoS and ransomware | Deep Recurrent Neural Networks (RNNs), Lightweight Convolutional Neural Networks (CNNs), and graph-based methods |
[63] | Ransomware | Self-supervised malware detection system, GAN-based self-supervised malware detection system and adversarial self-supervised malware detection system |
[64] | Viruses, Trojans, worms, bots, backdoors, spams, spyware, and ransomware | Machine learning classifier |
[65] | Malware within the context of IoT applications such as malicious code and commands | Convolutional Neural Network (CNN) |
[66] | DoS, DDoS, keylogging, OS fingerprinting, service scanning | Logistic Regression (LR), Naive Bayes (NB), Decision Tree (DT), k-Nearest Neighbors (KNN), Support Vector Machines (SVM), Neural Networks (NN), and Random Forest (RF) |
[67] | Trojen horses, adware, spyware, worms, viruses and ransomewares | K-Neariest Neighbors (KNN), Support Vector Machine (SVM) and Logistic Regression (LR) |
[68] | DoS, DDoS, and Botnet | LSTM |
[69] | DDoS and botnet | Bidirectional long- and short-term memory (LSTM) neural network |
[70] | DDoS, brute force, DoS, HTTP flooding, ACK flooding, port scanning, and ARP spoofing | Decision Trees (DT), AdaBoost, and gradient boosting trees |
[71] | Botnet | Isolation forest and deep autoencoder |
[72] | Botnets and DDoS | Hidden Markov model (HMM) |
[73] | Poer scanning, DDoS, DoS, information theft, and keylogging | Recurrent Neural Network (RNN) |
[74] | Zero-day attacks | Support Vector Machine (SVM) |
[75] | Botnets and DDoS | CNN |
[76] | Spyware, worms, logic bombs, viruses, rootkits, trojan horses, adware, backdoors, ransomware, and bots | K-means, DT, and hybrid model |
[77] | DDoS and botnet | CNN |
[78] | Evasive malware, second-generation malware, and basic malicious software | SVM, NB, and DT |
[79] | Backdoors, spyware, trojans, and worms | Artificial Immune System (AIS) |
[80] | Zero-day botnet | Deep Neural Network (DNN) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alshamsi, O.; Shaalan, K.; Butt, U. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. Information 2024, 15, 631. https://doi.org/10.3390/info15100631
Alshamsi O, Shaalan K, Butt U. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. Information. 2024; 15(10):631. https://doi.org/10.3390/info15100631
Chicago/Turabian StyleAlshamsi, Omar, Khaled Shaalan, and Usman Butt. 2024. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach" Information 15, no. 10: 631. https://doi.org/10.3390/info15100631
APA StyleAlshamsi, O., Shaalan, K., & Butt, U. (2024). Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. Information, 15(10), 631. https://doi.org/10.3390/info15100631