{"title":"IoT malware detection using static and dynamic analysis techniques: A systematic literature review","authors":"Sumit Kumar, Prachi Ahlawat, Jyoti Sahni","doi":"10.1002/spy2.444","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is reshaping the world with its potential to support new and evolving applications in areas, such as healthcare, automation, remote monitoring, and so on. This rapid popularity and growth of IoT‐based applications coincides with a significant surge in threats and malware attacks on IoT devices. Furthermore, the widespread usage of Linux‐based systems in IoT devices makes malware detection a challenging task. Researchers and practitioners have proposed a variety of techniques to address these threats in the IoT ecosystem. Both researchers and practitioners have proposed a range of techniques to counter these threats within the IoT ecosystem. However, despite the multitude of proposed techniques, there remains a notable absence of a comprehensive and systematic review assessing the efficacy of static and dynamic analysis methods in detecting IoT malware. This research work is a systematic literature review (SLR) that aims to offer a concise summary of the latest advancements in the field of IoT malware detection, specifically focusing on the utilization of static and dynamic analytic techniques. The SLR focuses on examining the present status of research, methodology, and trends in the area of IoT malware detection. It accomplishes this by synthesizing the findings from a wide range of scholarly works that have been published in well‐regarded academic journals and conferences. Additionally, the SLR highlights the significance of the empirical process that includes the role of selecting datasets, accurate feature selection and the utilization of machine learning algorithms in enhancing the detection accuracy. The study also evaluates the capability of different analysis techniques to detect malware and compares the performance of various models for IoT malware detection. Furthermore, the review concluded by addressing several open issues and challenges that the research community as a whole must address.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.444","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) is reshaping the world with its potential to support new and evolving applications in areas, such as healthcare, automation, remote monitoring, and so on. This rapid popularity and growth of IoT‐based applications coincides with a significant surge in threats and malware attacks on IoT devices. Furthermore, the widespread usage of Linux‐based systems in IoT devices makes malware detection a challenging task. Researchers and practitioners have proposed a variety of techniques to address these threats in the IoT ecosystem. Both researchers and practitioners have proposed a range of techniques to counter these threats within the IoT ecosystem. However, despite the multitude of proposed techniques, there remains a notable absence of a comprehensive and systematic review assessing the efficacy of static and dynamic analysis methods in detecting IoT malware. This research work is a systematic literature review (SLR) that aims to offer a concise summary of the latest advancements in the field of IoT malware detection, specifically focusing on the utilization of static and dynamic analytic techniques. The SLR focuses on examining the present status of research, methodology, and trends in the area of IoT malware detection. It accomplishes this by synthesizing the findings from a wide range of scholarly works that have been published in well‐regarded academic journals and conferences. Additionally, the SLR highlights the significance of the empirical process that includes the role of selecting datasets, accurate feature selection and the utilization of machine learning algorithms in enhancing the detection accuracy. The study also evaluates the capability of different analysis techniques to detect malware and compares the performance of various models for IoT malware detection. Furthermore, the review concluded by addressing several open issues and challenges that the research community as a whole must address.
物联网(IoT)正在重塑世界,它具有支持医疗保健、自动化、远程监控等领域不断发展的新应用的潜力。在基于物联网的应用迅速普及和增长的同时,针对物联网设备的威胁和恶意软件攻击也大幅增加。此外,由于物联网设备广泛使用基于 Linux 的系统,恶意软件检测成为一项具有挑战性的任务。研究人员和从业人员提出了各种技术来应对物联网生态系统中的这些威胁。研究人员和从业人员都提出了一系列技术来应对物联网生态系统中的这些威胁。然而,尽管提出了大量技术,但仍明显缺乏全面系统的综述,以评估静态和动态分析方法在检测物联网恶意软件方面的功效。这项研究工作是一项系统性文献综述(SLR),旨在简明扼要地总结物联网恶意软件检测领域的最新进展,尤其侧重于静态和动态分析技术的使用。SLR 重点考察了物联网恶意软件检测领域的研究现状、方法和趋势。为此,它综合了在知名学术期刊和会议上发表的大量学术著作的研究成果。此外,SLR 还强调了经验过程的重要性,其中包括选择数据集、准确选择特征和利用机器学习算法在提高检测准确性方面的作用。研究还评估了不同分析技术检测恶意软件的能力,并比较了各种物联网恶意软件检测模型的性能。此外,综述最后还讨论了整个研究界必须解决的几个开放性问题和挑战。