IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v12y2024i10p1437-d1389917.html
   My bibliography  Save this article

A Hybrid Optimization Model for Efficient Detection and Classification of Malware in the Internet of Things

Author

Listed:
  • Ijaz Ahmad

    (School of Mathematics and Statistics, Central South University, Changsha 410083, China)

  • Zhong Wan

    (School of Mathematics and Statistics, Central South University, Changsha 410083, China)

  • Ashfaq Ahmad

    (School of Mathematics and Statistics, Central South University, Changsha 410083, China)

  • Syed Sajid Ullah

    (Department of Information and Communication Technology, University of Agder (UiA), N-4898 Grimstad, Norway)

Abstract

The proliferation of Internet of Things (IoT) devices and their integration into critical infrastructure and business operations has rendered them susceptible to malware and cyber-attacks. Such malware presents a threat to the availability and reliability of IoT devices, and a failure to address it can have far-reaching impacts. Due to the limited resources of IoT devices, traditional rule-based detection systems are often ineffective against sophisticated attackers. This paper addressed these issues by designing a new framework that uses a machine learning (ML) algorithm for the detection of malware. Additionally, it also employed sequential detection architecture and evaluated eight malware datasets. The design framework is lightweight and effective in data processing and feature selection algorithms. Moreover, this work proposed a classification model that utilizes one support vector machine (SVM) algorithm and is individually tuned with three different optimization algorithms. The employed optimization algorithms are Nuclear Reactor Optimization (NRO), Artificial Rabbits Optimization (ARO), and Particle Swarm Optimization (PSO). These algorithms are used to explore a diverse search space and ensure robustness in optimizing the SVM for malware detection. After extensive simulations, our proposed framework achieved the desired accuracy among eleven existing ML algorithms and three proposed ensemblers (i.e., NRO_SVM, ARO_SVM, and PSO_SVM). Among all algorithms, NRO_SVM outperforms the others with an accuracy rate of 97.8%, an F1 score of 97%, and a recall of 99%, and has fewer false positives and false negatives. In addition, our model successfully identified and prevented malware-induced attacks with a high probability of recognizing new evolving threats.

Suggested Citation

  • Ijaz Ahmad & Zhong Wan & Ashfaq Ahmad & Syed Sajid Ullah, 2024. "A Hybrid Optimization Model for Efficient Detection and Classification of Malware in the Internet of Things," Mathematics, MDPI, vol. 12(10), pages 1-27, May.
  • Handle: RePEc:gam:jmathe:v:12:y:2024:i:10:p:1437-:d:1389917
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/12/10/1437/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/12/10/1437/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:12:y:2024:i:10:p:1437-:d:1389917. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.