Skip to main content

A New Method to Analysis of Internet of Things Malware Using Image Texture Component and Machine Learning Techniques

  • Conference paper
  • First Online:
Artificial Intelligence and Industrial Applications (A2IA 2020)

Abstract

Threats derived from Internet of Things (IoT) malicious software are fast progressing and difficult phenomena. Contrary to conventional networks, Internet of things has unique attributes like non compatibility of devices, elevated scalability and different architectures that makes its malware analysis difficult. In this paper, we have developed a new method to analyzing and classifying IoT malware using decomposition image based on the Partial Differential Equations (PDE), the effective texture features extraction is performed not on the original image but on its texture component obtained by the PDE. The texture features based on Haralick are then calculated, and machine learning classifiers namely K-nearest neighbor (KNN), naïve Bayes (NB) and random forest (RF) are used. A binary file (malicious or benign) is transformed to a gray scale image. The gray level co-occurence matrix (GLCM) is computed not on the original image but on its texture component.

Based on these gray level co-occurence matrix parameters, five Haralick features namely angular second moment, entropy, contrast; inverse different moment and correlation are calculated. Finally, these Haralick texture features are used to perform malware classification using random forest, naïve Bayes and K-nearest neighbor. Experimental results show that our approach obtains 95% accuracy for Random Forest, 89% for naïve Bayes and 80% for K-nearest neighbor classifiers. Generally, use of texture component for feature extraction can realize a low computational and platform independent classification scheme for IoT malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rouse, M.: Internet of things (IoT). IOT Agenda (2019). Accessed 14 Aug 2019

    Google Scholar 

  2. Brown, E.: 21 Open Source Projects for IoT. Linux.com, September 20 2016. Accessed 23 Oct 2016

    Google Scholar 

  3. Internet of Things Global Standards Initiative. ITU (2015). Accessed 26 June 2015

    Google Scholar 

  4. The Enterprise Internet of Things Market. Business Insider, 25 February 2015. Accessed 26 June 2015

    Google Scholar 

  5. Perera, C., Liu, C.H., Jayawardena, S.: The emerging internet of things marketplace from an industrial perspective: a survey. IEEE Trans. Emerg. Top. Comput. 3(4), 585–598 (2015)

    Article  Google Scholar 

  6. Karanja, E.M., Masupe, S., Mandu, J.: Internet of things malware: a survey. Int. J. Comput. Sci. Eng. Surv. 8(3), 1–20 (2017). https://doi.org/10.5121/ijcses.2017.8301

    Article  Google Scholar 

  7. Meyer, Y.: Oscillating patterns in image processing and nonlinear evolution equations. In: The Fifteenth Dean Jacqueline B. Lewis Memorial Lectures, vol. 22. University Lecture Series. AMS, Providence (2001)

    Google Scholar 

  8. Senhaji, S., Aarab, A.: A new and robust image watermarking technique using contourlet- DCT domain and decomposition model. Int. Rev. Comput. Softw. 8(3), 747–752 (2013)

    Google Scholar 

  9. Senhaji, S., Aarab, A.: A new image watermarking using texture component: application color image. Int. J. Comput. Sci. Issues (IJCSI) 9(3), no. 1 (2012)

    Google Scholar 

  10. Senhaji, S., Sabri, A., Aarab, A.: A new and robust image watermarking technique based on the Partial Differential Equations. Int. J. Commun. Antenna Propag. (I.RE.CA.P) 1(4), 330–334 (2011)

    Google Scholar 

  11. Ould Dyla, M.H., Senhaji, S., Tairi, H., Aarab, A.: Content based images retrieval using decomposition model image. Int. Rev. Comput. Softw. 5(1), 113–118 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Saloua Senhaji , Sanaa Faquir , Fidae Harchli , Hajji Tarik or Mohammed Ouazzani Jamil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Senhaji, S., Faquir, S., Harchli, F., Tarik, H., Ouazzani Jamil, M. (2021). A New Method to Analysis of Internet of Things Malware Using Image Texture Component and Machine Learning Techniques. In: Masrour, T., El Hassani, I., Cherrafi, A. (eds) Artificial Intelligence and Industrial Applications. A2IA 2020. Lecture Notes in Networks and Systems, vol 144. Springer, Cham. https://doi.org/10.1007/978-3-030-53970-2_11

Download citation

Publish with us

Policies and ethics