Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches
Abstract
:1. Introduction
Contribution and Organization of the Paper
2. Security Challenges and Malware Attacks in the IoT
2.1. IoT Characteristics and Challenges on Security
- Interconnectivity refers to the connection of the device to the cloud and/or other devices. Connectivity is needed to enable the control of the device remotely, but mostly to access the data collected by the IoT device’s sensors. For example, an IoMT device for heart disease prediction is remotely controlled to monitor the patient’s heart rate [16]. The health parameters are collected in real-time and transmitted to a data center in the cloud. Therefore, securing this connection is vital to protect critical information.
- The IoT devices are heterogeneous as they may be built on different platforms and have different specifications. The hardware, such as a simple sensor to monitor the heart rate in [16], and virtual things, such as a data center built on the cloud, could be supplied by different vendors. These integrated IoT devices could use different security measures, leading to a lack of standardization in the network. Each connected device could use different security protocols, with their security bugs and limitations, exposing the system to different kinds of hacking.
- In the IoT environment, physical and virtual devices are capable of exchanging services within the constraints of the devices. Since the communication between different IoT devices is not controlled by a central processor/human, this could form a serious threat. If a malicious device is disguised as an accepted IoT device, it could start to disturb other devices by installing malicious files.
- The number of IoT devices is increasing exponentially and is generating an unprecedented amount of data. The expected number of IoT devices by 2025 is between 25 billion and 50 billion [17]. The scale is simply enormous, and data privacy and integrity are critical challenges in massive-scale networks. For instance, IoMT-based COVID-19 applications are creating massive amounts of real-time data that are stored in the cloud. However, as the amount of generated data continues to increase, the network pressure increases, which might lead to occurrences of erroneous interpretations [18].
2.2. Malware Analysis and Detection
2.2.1. Malware Analysis
- Static analysis, also called code analysis: In this technique, the infected file is inspected and analyzed without executing it. Low-level information is extracted such as the control flow graph (CFG), data flow graph, and system calls. Static analysis is fast at analyzing data and safe to use; also, it has a low level of false-positives, which means a higher detection rate. Moreover, the static analysis tracks all possible paths, which gives it a global view; however, it fails in detecting unknown malware using code obfuscation.
- Dynamic analysis, also called behavioral analysis: In dynamic analysis, the infected file is inspected during execution, which is usually conducted on an invisible virtual machine, so the malware file does not change its behaviors. Dynamic analysis is time-consuming and vulnerable, and it can only detect a few paths based on triggered files. Furthermore, it is neither safe nor fast, and it suffers from a high level of false positives. However, dynamic analysis is known for its good performance in detecting new and unknown malware.
- Hybrid analysis: this technique was designed to overcome the challenges and limitations of the previous two techniques. First, it analyzes the signature descriptions of any malware code and then combines that with other dynamic parameters to improve the analysis of malware.
2.2.2. Malware Detection Techniques
- In the signature-based technique, files are analyzed and compared to an existing list, and if they are listed in the list, they are classified as malware. This method is not effective for recognizing all malware that enters the network because some malware is encrypted, and thus extracting the signature takes time and a large amount of processing energy. Furthermore, it is not effective for new or unknown malware.
- The behavioral-based method monitors the program’s behavior rather than reading its signature. This technique follows three steps: the first step collects information about the program, the second step interprets the data through conversion to intermediate representations, and the last step matches the intermediate representation with known behavior signatures. There are two approaches to this technique, the first of which is simulating the behavior of legitimate programs and comparing any new program to that model. This approach works for the detection of most malware, even new kinds. However, it is expensive to implement because of the different behaviors of each program in the network; for example, a video reader will use different services than a mail or a web client. The second approach is simulating the behavior of known malware and comparing it to new programs, which means new (unknown) malware cannot be identified.
- The specification-based method was introduced to overcome the disadvantages and limitations of the first two techniques. This technique uses different features for malware detection, including the following:
- (a)
- API calls: Hofmeyr et al. were among the first to propose using application interface and system call sequences for malware detection [22].
- (b)
- OpCode: Executable files are made of series of assembly codes, and in this method, researchers use this operational code to detect malware [23].
- (c)
- N-Grams: this method uses executable programs’ binary codes for malware detection [24].
- (d)
- CFG: This is a graph that illustrates the control flow of programs, and it has been used to analyze malware behavior [25].
- (e)
- Hybrid feature: in this machine learning method, researchers combine different techniques for malware detection to get better results. For example, Eskandari et al. in [26] used CFG and API calls for metamorphic malware detection.
- (f)
- Game theoretic-based anomaly detection algorithms: Zhu, Quanyan, and T. Başar presented different solutions to malware detection using behavioral analysis, such as the data exfiltration detection and prevention and consensus algorithm, with censored data for distributed detection [27].
- (g)
- Prospect theoretic approaches: These approaches are based on measuring the trustworthiness of the aggregated data in the system. In [28], the authors present a hardware trojan detection game based on prospective theory approaches. Furthermore, in [29], the authors introduce a prospect theory-based framework to ensure risk awareness and protect network operations.
2.3. Malware in the IoT
3. Artificial Immune Systems
3.1. Introduction to Artificial Immune Systems
3.2. Introduction to the Immune System
3.3. Artificial Immune Systems Methods
4. AIS to Secure the IoT: Literature Review and Analysis
4.1. AIS in Malware Detection in the IoT
4.1.1. Negative and Positive Algorithms
4.1.2. Negative and Neural Networks
4.1.3. Immune and Artificial Immune Based Algorithms
5. Quantitative Performance Analysis of Leading AIS Methods in IoT Malware Detection
5.1. Detection Accuracy and F1-Score
- True positive (TP): malware is detected as a malicious application;
- True negative (TN): benign software is detected as non-malicious application;
- False positive (FP): benign software is detected as a malicious application;
- False negative (FN): malware is detected as non-malicious application.
5.2. Memory and Time Complexity
6. Trends and Promises
6.1. IoT System Security Requirements
6.2. Immune-Based Implementations Challenges
6.3. AIS Hybrid Solution Challenges in the IoT
6.4. Future Research Directions
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Chamola, V.; Hassija, V.; Gupta, V.; Guizani, M. A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact. IEEE Access 2020, 8, 90225–90265. [Google Scholar] [CrossRef]
- Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C. Review of Security and Privacy for the Internet of Medical Things (IoMT). In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece, 29–31 May 2019; pp. 457–464. [Google Scholar] [CrossRef]
- Donalds, C.; Osei-Bryson, K.M. Toward a cybercrime classification ontology: A knowledge-based approach. Comput. Hum. Behav. 2019, 92, 403–418. [Google Scholar] [CrossRef]
- The Biggest Data Breaches in the First Half of 2020. 2020. Available online: https://www.keepnetlabs.com/the-biggest-data-breaches-in-the-first-half-of-2020/ (accessed on 1 October 2021).
- Irwin, L. List of Data Breaches and Cyber Attacks in May 2021. IT Governance UK Blog. Available online: https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-may-2021-116-million-records-breached (accessed on 1 October 2021).
- Outdated Software Leaves NHS ‘Vulnerable to Cyber Attack’. Available online: https://www.digitalhealth.net/2019/04/outdated-software-leaves-nhs-vulnerable-to-cyber-attack-new-research-says/ (accessed on 1 October 2021).
- Saleem, M. Brexit Impact on Cyber Security of United Kingdom. In Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 14–16 June 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Ghafur, S.; Kristensen, S.; Honeyford, K.; Martin, G.; Darzi, A.; Aylin, P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ Digit. Med. 2019, 2, 1–7. [Google Scholar] [CrossRef] [PubMed]
- Aldhaheri, S.; Alghazzawi, D.; Cheng, L.; Barnawi, A.; Alzahrani, B. Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research. J. Netw. Comput. Appl. 2020, 157, 102537. [Google Scholar] [CrossRef]
- Othman, M.; El-Mousa, A. Internet of Things Cloud Computing Internet of Things as a Service Approach. In Proceedings of the 2020 11th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 7–9 April 2020; pp. 318–323. [Google Scholar] [CrossRef]
- Asghari, P.; Rahmani, A.M.; Javadi, H.H.S. Internet of Things applications: A systematic review. Comput. Netw. 2019, 148, 241–261. [Google Scholar] [CrossRef]
- Koutras, D.; Stergiopoulos, G.; Dasaklis, T.; Kotzanikolaou, P.; Glynos, D.; Douligeris, C. Security in IoMT Communications: A Survey. Sensors 2020, 20, 4828. [Google Scholar] [CrossRef] [PubMed]
- Marathe, S.; Nambi, A.; Swaminathan, M.; Sutaria, R. CurrentSense: A novel approach for fault and drift detection in environmental IoT sensors. In Proceedings of the International Conference on Internet-of-Things Design and Implementation, Charlottesvle, VA, USA, 18–21 May 2021; pp. 93–105. [Google Scholar]
- Lv, Z.; Qiao, L.; Kumar Singh, A.; Wang, Q. AI-Empowered IoT Security for Smart Cities. ACM Trans. Internet Technol. 2021, 21. [Google Scholar] [CrossRef]
- Xenofontos, C.; Zografopoulos, I.; Konstantinou, C.; Jolfaei, A.; Khan, M.K.; Choo, K.K.R. Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet Things J. 2021. [Google Scholar] [CrossRef]
- Khan, M.; Algarni, F. A Healthcare Monitoring System for the Diagnosis of Heart Disease in the IoMT Cloud Environment Using MSSO-ANFIS. IEEE Access 2020, 8, 122259–122269. [Google Scholar] [CrossRef]
- Zhang, J.; Li, G.; Marshall, A.; Hu, A.; Hanzo, L. A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels. IEEE Access 2020, 8, 138406–138446. [Google Scholar] [CrossRef]
- Lin, H.; Garg, S.; Hu, J.; Wang, X.; Piran, M.J.; Hossain, M.S. Privacy-enhanced Data Fusion for COVID-19 Applications in Intelligent Internet of Medical Things. IEEE Internet Things J. 2020. [Google Scholar] [CrossRef]
- Jeon, J.; Park, J.; Jeong, Y. Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model. IEEE Access 2020, 8, 96899–96911. [Google Scholar] [CrossRef]
- Greensmith, J. Securing the Internet of Things with Responsive Artificial Immune Systems. In Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation (GECCO ’15); Association for Computing Machinery, Madrid, Spain, 18–21 May 2021; pp. 113–120. [Google Scholar] [CrossRef]
- Aslan, Ö.; Samet, R. A comprehensive review on malware detection approaches. IEEE Access 2020, 8, 6249–6271. [Google Scholar] [CrossRef]
- Hofmeyr, S.; Forrest, S.; Somayaji, A. Intrusion Detection Using Sequences of System Calls. J. Comput. Secur. 1998, 6, 151–180. [Google Scholar] [CrossRef]
- Bilar, D. Opcodes as Predictor for Malware. Int. J. Electron. Secur. Digit. Forensic 2007, 1, 156–168. [Google Scholar] [CrossRef]
- Schultz, M.; Eskin, E.; Zadok, F.; Stolfo, S. Data mining methods for detection of new malicious executables. In Proceedings of the 2001 IEEE Symposium on Security and Privacy. S & P 2001, Oakland, CA, USA, 14–16 May 2001; pp. 38–49. [Google Scholar] [CrossRef] [Green Version]
- Jalote, P. An Integrated Approach to Software Engineering; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Eskandari, M.; Hashemi, S. Metamorphic malware detection using control flow graph mining. Int. J. Comput. Sci. Netw. Secur 2011, 11, 1–6. [Google Scholar]
- Buttyán, L.; Baras, J.S. Decision and Game Theory for Security; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
- Saad, W.; Sanjab, A.; Wang, Y.; Kamhoua, C.A.; Kwiat, K.A. Hardware Trojan Detection Game: A Prospect-Theoretic Approach. IEEE Trans. Veh. Technol. 2017, 66, 7697–7710. [Google Scholar] [CrossRef]
- Vamvakas, P.; Tsiropoulou, E.E.; Papavassiliou, S. Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 1–20. [Google Scholar] [CrossRef]
- Pandey, S.K.; Mehtre, B. A lifecycle based approach for malware analysis. In Proceedings of the 2014 Fourth International Conference on Communication Systems and Network Technologies, Bhopal, India, 7–9 April 2014; pp. 767–771. [Google Scholar]
- Raza, S.; Wallgren, L.; Voigt, T. SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc Netw. 2013, 11, 2661–2674. [Google Scholar] [CrossRef]
- Abusnaina, A.; Anwar, A.; Alshamrani, S.; Alabduljabbar, A.; Jang, R.; Nyang, D.; Mohaisen, D. Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. In Proceedings of the 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), Taipei, Taiwan, 21–24 June 2021; pp. 3–4. [Google Scholar]
- Wu, H.; Han, H.; Wang, X.; Sun, S. Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey. IEEE Access 2020, 8, 153826–153848. [Google Scholar] [CrossRef]
- SonicWall 2019 Report: 55 Rise in IoT Malware Attacks. 2019. Available online: https://www.openaccessgovernment.org/iot-malware-attacks/69870/ (accessed on 1 October 2021).
- Muncaster, P. Over 100 Million IoT Attacks Detected in 1H 2019. 2019. Available online: https://www.infosecurity-magazine.com/news/over-100-million-iot-attacks/ (accessed on 1 October 2021).
- Fernandes, D.; Freire, M.; Fazendeiro, P.; Inácio, P. Applications of artificial immune systems to computer security: A survey. J. Inf. Secur. Appl. 2017, 35, 138–159. [Google Scholar] [CrossRef]
- Fuyong, Z.; Deyu, Q. Run-time malware detection based on positive selection. J. Comput. Virol. 2011, 7, 267. [Google Scholar] [CrossRef]
- Forrest, S.; Perelson, A.S.; Allen, L.; Cherukuri, R. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 16–18 May 1994; pp. 202–212. [Google Scholar] [CrossRef]
- Ji, Z.; Dasgupta, D. Revisiting negative selection algorithms. Evol. Comput. 2007, 15, 223–251. [Google Scholar] [CrossRef] [PubMed]
- Burnet, M. The Clonal Selection Theory of Acquired Immunity; Vanderbilt University Press Nashville: Nashville, TN, USA, 1959; Volume 3. [Google Scholar]
- De Castro, L.; Von Zuben, F. Learning and optimization using the clonal selection principle. IEEE Trans. Evol. Comput. 2002, 6, 239–251. [Google Scholar] [CrossRef]
- Jerne, N. Towards a network theory of the immune system. Ann. Immunol. 1974, 125, 373–389. [Google Scholar]
- Scaranti, G.; Carvalho, L.; Barbon, S.; Proença, M. Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks. IEEE Access 2020, 8, 100172–100184. [Google Scholar] [CrossRef]
- Roman, R.; Rios, R.; Onieva, J.; Lopez, J. Immune System for the Internet of Things Using Edge Technologies. IEEE Internet Things J. 2019, 6, 4774–4781. [Google Scholar] [CrossRef]
- Saleem, K.; Chaudhry, J.; Orgun, M.; Al-Muhtadi, J. A bio-inspired secure IPv6 communication protocol for Internet of Things. In Proceedings of the 2017 Eleventh International Conference on Sensing Technology (ICST), Sydney, NSW, Australia, 4–6 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Ji, Z.; Dasgupta, D. Real-valued negative selection algorithm with variable-sized detectors. In Genetic and Evolutionary Computation Conference; Springer: Berlin/Heidelberg, Germany, 2004; pp. 287–298. [Google Scholar]
- Dasgupta, D.; Gonzalez, F. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evol. Comput. 2002, 6, 281–291. [Google Scholar] [CrossRef]
- Shapiro, J.; Lamont, G.; Peterson, G. An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection. In Proceedings of the 7th Annual Conference on Genetic and Evolutionary Computation, Washington, DC, USA, 25–29 June 2005; pp. 337–344. [Google Scholar]
- Balachandran, S.; Dasgupta, D.; Nino, F.; Garrett, D. A Framework for Evolving Multi-Shaped Detectors in Negative Selection. In Proceedings of the 2007 IEEE Symposium on Foundations of Computational Intelligence, Honolulu, HI, USA, 1–5 April 2007; pp. 401–408. [Google Scholar] [CrossRef]
- Alrubbayi, H.; Goteng, G.; Jaber, M.; Kelly, J. A Novel Negative and Positive Selection Algorithm to Detect Unknown Malware in the IoT. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 10–13 May 2021. [Google Scholar]
- Pamukov, M.; Poulkov, V. Multiple negative selection algorithm: Improving detection error rates in IoT intrusion detection systems. In Proceedings of the 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest, Romania, 21–23 September 2017; Volume 1, pp. 543–547. [Google Scholar] [CrossRef]
- Igawa, K.; Ohashi, H. A negative selection algorithm for classification and reduction of the noise effect. Appl. Soft Comput. 2009, 9, 431–438. [Google Scholar] [CrossRef]
- Zhang, F.; Qi, D.; Hu, J. MBMAS: A System for Malware Behavior Monitor and Analysis. In Proceedings of the 2009 International Symposium on Computer Network and Multimedia Technology, Wuhan, China, 18–20 January 2009; pp. 1–4. [Google Scholar] [CrossRef]
- Pamukov, M.; Poulkov, V.; Shterev, V. Negative Selection and Neural Network Based Algorithm for Intrusion Detection in IoT. In Proceedings of the 2018 41st International Conference on Telecommunications and Signal Processing (TSP), Athens, Greece, 4–6 July 2018; pp. 1–5. [Google Scholar] [CrossRef]
- NSL-KDD Dataset. Available online: https://www.unb.ca/cic/datasets/nsl.html (accessed on 1 October 2021).
- Aldhaheri, S.; Alghazzawi, D.; Cheng, L.; Alzahrani, B.; Al-Barakati, A. DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System. Appl. Sci. 2020, 10, 1909. [Google Scholar] [CrossRef] [Green Version]
- Parrend, P.; David, P.; Guigou, F.; Pupka, C.; Collet, P. The AWA Artificial emergent aWareness Architecture model for Artificial Immune Ecosystems. In Proceedings of the 2017 IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain, 5–8 June 2017; pp. 403–410. [Google Scholar] [CrossRef]
- Liu, C.; Zhang, Y.; Zhang, H. A Novel Approach to IoT Security Based on Immunology. In Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security, Emeishan, China, 14–15 December 2013; pp. 771–775. [Google Scholar] [CrossRef]
- Chen, R.; Liu, C.M.; Chen, C. An artificial immune-based distributed intrusion detection model for the internet of things. In Advanced Materials Research; Trans Tech Publ.: Zurich, Switzerland, 2012; Volume 366, pp. 165–168. [Google Scholar]
- Liu, C.; Yang, J.; Chen, R.; Zhang, Y.; Zeng, J. Research on immunity-based intrusion detection technology for the Internet of Things. In Proceedings of the 2011 Seventh International Conference on Natural Computation, Shanghai, China, 26–28 July 2011; Volume 1, pp. 212–216. [Google Scholar] [CrossRef]
- Albulayhi, K.; Smadi, A.A.; Sheldon, F.T.; Abercrombie, R.K. IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors 2021, 21, 6432. [Google Scholar] [CrossRef] [PubMed]
- The bot-IOT Dataset. Available online: https://research.unsw.edu.au/projects/bot-iot-dataset (accessed on 1 October 2021).
Method | Year | Experiment Results Included | Malware Files Used in the Experiment | Limitations and Shortcoming Presented | Method Covers Holes and Overlaps |
---|---|---|---|---|---|
NPS [50] | 2021 | ✔ | ✔ | ✔ | ✘ |
MNSA [51] | 2017 | ✔ | ✘ | ✔ | ✘ |
PCSA [37] | 2011 | ✔ | ✔ | ✔ | ✔ |
NSNN [54] | 2018 | ✔ | ✔ | ✘ | ✘ |
DeepDCA [56] | 2020 | ✔ | ✔ | ✘ | ✘ |
AWA [57] | 2017 | ✔ | ✘ | ✔ | ✘ |
Immune-base [58] | 2013 | ✔ | ✘ | ✘ | ✘ |
AIS-based [59] | 2012 | ✘ | NA | ✘ | ✘ |
Immune-based [60] | 2011 | ✘ | NA | ✘ | ✘ |
Total number of records used | 1,074,992 |
Number of attack files | 262,178 |
Number of benign files | 812,814 |
List of attacks | Brute-force, Heartbleed attack, Botnet, Denial of service, Distributed Denial-of-Service, Web attacks, and infiltration of the network from inside |
Number of traffic features | 80 |
Some of the traffic features | Destination port, flow duration, average size of packet, number of forward packets per second, number of backward packets per second |
Method | M | L | ||
---|---|---|---|---|
NPS | 2 | 16 | 1000 | 60 |
MNSA | 2 | 12 | 1000 | 170 |
NSNN | 2 | 7 | 1000 | 1000 |
Property | Definition |
---|---|
Robust | The capability of a system to cope with issues during execution and continue operating despite data conditions |
Lightweight | The capability to operate and execute with minimal computational complexity |
Fault tolerance | The capability to function given a defect within hardware or software in the system, and adapt to the changing environment to build up a trustworthy network |
Adaptive | The capability to adapt and learn the system behavior over runtime |
Distributed | The capability to run and communicate within a distributed environment |
Method/Properties | Robust | Lightweight | Fault Tolerant | Adaptive | Distributed |
---|---|---|---|---|---|
NPS: negative selection + positive selection [50] | ✔ | ✔ | ✔ | ✔ | ✔ |
MNSA: negative selection + positive selection [51] | ✘ | ✘ | ✘ | ✔ | ✔ |
PCSA: positive selection [37] | ✘ | ✔ | ✘ | ✔ | ✔ |
NSNN: negative selection + neural network [54] | ✘ | ✘ | ✔ | ✔ | ✔ |
AWA: artificial immune ecosystem [57] | ✔ | ✘ | ✘ | ✔ | ✔ |
Immune system based method [58] | ✔ | ✘ | ✘ | ✔ | ✘ |
Artificial Immune based method [59] | ✔ | ✘ | ✘ | ✔ | ✔ |
Immune System based method [60] | ✔ | ✘ | ✘ | ✔ | ✔ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alrubayyi, H.; Goteng, G.; Jaber, M.; Kelly, J. Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches. J. Sens. Actuator Netw. 2021, 10, 61. https://doi.org/10.3390/jsan10040061
Alrubayyi H, Goteng G, Jaber M, Kelly J. Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches. Journal of Sensor and Actuator Networks. 2021; 10(4):61. https://doi.org/10.3390/jsan10040061
Chicago/Turabian StyleAlrubayyi, Hadeel, Gokop Goteng, Mona Jaber, and James Kelly. 2021. "Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches" Journal of Sensor and Actuator Networks 10, no. 4: 61. https://doi.org/10.3390/jsan10040061
APA StyleAlrubayyi, H., Goteng, G., Jaber, M., & Kelly, J. (2021). Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches. Journal of Sensor and Actuator Networks, 10(4), 61. https://doi.org/10.3390/jsan10040061