Intellectual Feature Ranking Model with Correlated Feature Set based Malware Detection in Cloud environment using Machine Learning

Main Article Content

Sanaboyina Madhusudhana Rao
Arpit Jain
PVSS Gangadhar
Vinay Sowpati

Abstract

Malware detection for cloud systems has been studied extensively, and many different approaches have been developed and implemented in an effort to stay ahead of this ever-evolving threat. Malware refers to any programme or defect that is designed to duplicate itself or cause damage to the system's hardware or software. These attacks are designed specifically to cause harm to operational systems, but they are invisible to the human eye. One of the most exciting developments in data storage and service delivery today is cloud computing. There are significant benefits to be gained over more conventional protection methods by making use of this fast evolving technology to protect computer-based systems from cyber-related threats. Assets to be secured may reside in any networked computing environment, including but not limited to Cyber Physical Systems (CPS), critical systems, fixed and portable computers, mobile devices, and the Internet of Things (IoT). Malicious software or malware refers to any programme that intentionally compromises a computer system in order to compromise its security, privacy, or availability. A cloud-based intelligent behavior analysis model for malware detection system using feature set is proposed to identify the ever-increasing malware attacks. The suggested system begins by collecting malware samples from several virtual machines, from which unique characteristics can be extracted easily. Then, the malicious and safe samples are separated using the features provided to the learning-based and rule-based detection agents. To generate a relevant feature set for accurate malware detection, this research proposes an Intellectual Feature Ranking Model with Correlated Feature Set (IFR-CFS) model using enhanced logistic regression model for accurate detection of malware in the cloud environment. The proposed model when compared to the traditional feature selection model, performs better in generation of feature set for accurate detection of malware.

Article Details

How to Cite
Rao, S. M. ., Jain, A. ., Gangadhar, P. ., & Sowpati, V. . (2023). Intellectual Feature Ranking Model with Correlated Feature Set based Malware Detection in Cloud environment using Machine Learning. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 187–198. https://doi.org/10.17762/ijritcc.v11i9.8334
Section
Articles

References

Ahmed, M. Anisetti, A. Ahmad and G. Jeon, "A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoT," in IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1495-1503, Feb. 2023, doi: 10.1109/TII.2022.3205366.

W. Wang et al., "Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions," in IEEE Access, vol. 7, pp. 67602-67631, 2019, doi: 10.1109/ACCESS.2019.2918139.

J. C. Kimmel, A. D. Mcdole, M. Abdelsalam, M. Gupta and R. Sandhu, "Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure," in IEEE Access, vol. 9, pp. 68066-68080, 2021, doi: 10.1109/ACCESS.2021.3077498.

P. Mishra et al., "VMShield: Memory Introspection-Based Malware Detection to Secure Cloud-Based Services Against Stealthy Attacks," in IEEE Transactions on Industrial Informatics, vol. 17, no. 10, pp. 6754-6764, Oct. 2021, doi: 10.1109/TII.2020.3048791.

Ö. Aslan, M. Ozkan-Okay and D. Gupta, "Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment," in IEEE Access, vol. 9, pp. 83252-83271, 2021, doi: 10.1109/ACCESS.2021.3087316.

Ö. Aslan and A. A. Yilmaz, "A New Malware Classification Framework Based on Deep Learning Algorithms," in IEEE Access, vol. 9, pp. 87936-87951, 2021, doi: 10.1109/ACCESS.2021.3089586.

M. Khoda, T. Imam, J. Kamruzzaman, I. Gondal and A. Rahman, "Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples," in IEEE Transactions on Industry Applications, vol. 56, no. 4, pp. 4415-4424, July-Aug. 2020, doi: 10.1109/TIA.2019.2958530.

H. Haddadpajouh, A. Mohtadi, A. Dehghantanaha, H. Karimipour, X. Lin and K. -K. R. Choo, "A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4540-4547, 15 March15, 2021, doi: 10.1109/JIOT.2020.3026660.

I.Ahmed, M. Ahmad, A. Ahmad and G. Jeon, "Iot-based crowd monitoring system: Using SSD with transfer learning", Comput. Elect. Eng., vol. 93, 2021.

Ahmed, M. Ahmad, J. J. Rodrigues and G. Jeon, "Edge computing-based person detection system for top view surveillance: Using centernet with transfer learning", Appl. Soft Comput., vol. 107, 2021.

M. Ahmad, I. Ahmed and G. Jeon, "An IoT-enabled real-time overhead view person detection system based on cascade-RCNN and transfer learning", J. Real-Time Image Process., vol. 18, pp. 1129-1139, 2021.

H. Jaidka, N. Sharma and R. Singh, "Evolution of IoT to IIoT: Applications & challenges", Proc. ICICC, 2020.

A.Mahmood et al., "Industrial IoT in 5g-and-beyond networks: Vision architecture and design trends", IEEE Trans. Ind. Inform., vol. 18, no. 6, pp. 4122-4137, Jun. 2022.

P. Varga et al., "5G support for industrial IoT applications–challenges solutions and research gaps", Sensors, vol. 20, no. 3, pp. 828, 2020.

Mohammed Khairullah Mohsin, Mustafa A. Fiath. (2023). Development of Load Balancing Methodology in Cloud Computing Platforms. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 660–672. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2743

P. Trakadas et al., "An artificial intelligence-based collaboration approach in industrial iot manufacturing: Key concepts architectural extensions and potential applications", Sensors, vol. 20, no. 19, 2020.

P. Deflorin, M. Scherrer and K. Schillo, "The influence of IIoT on manufacturing network coordination", J. Manuf. Technol. Manage., vol. 32, no. 6, pp. 1144-1166, 2021.

M. Compare, P. Baraldi and E. Zio, "Challenges to IoT-enabled predictive maintenance for industry 4.0", IEEE Internet Things J., vol. 7, no. 5, pp. 4585-4597, May 2020.

B. Almadani and S. M. Mostafa, "IIoT based multimodal communication model for agriculture and agro-industries", IEEE Access, vol. 9, pp. 10070-10088, 2021.

C. A. Ardagna, R. Asal, E. Damiani, N. El Ioini and C. Pahl, "Trustworthy IoT: An evidence collection approach based on smart contracts", Proc. IEEE SCC, pp. 46-50, 2019.

J. Sengupta, S. Ruj and S. D. Bit, "A comprehensive survey on attacks security issues and blockchain solutions for IoT and IIoT", J. Netw. Comput. Appl., vol. 149, 2020.

M. Anisetti, C. A. Ardagna, N. Bena and E. Damiani, "An assurance framework and process for hybrid systems", Proc. Int. Conf. E- Bus. Telecommun., pp. 79-101, 2020.

M. Anisetti, C. A. Ardagna, N. Bena and A. Foppiani, "An assurance-based risk management framework for distributed systems", Proc. IEEE ICWS, pp. 482-492, 2021.

M. Anisetti, F. Berto and M. Banzi, "Orchestration of data-intensive pipeline in 5G-enabled edge continuum", Proc. IEEE World Congr. Serv. (SERVICES), pp. 2-10, 2022.

V. Sharma, I. You, K. Yim, R. Chen and J.-H. Cho, "Briot: Behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems", IEEE Access, vol. 7, pp. 118556-118580, 2019.

R. Sihwail, K. Omar, K. Zainol Ariffin, and S. Al Afghani, “Malware detection approach based on artifacts in memory image and dynamic analysis,” Applied Sciences, vol. 9, no. 18, p. 3680, 2019.

A.Pinhero, M. L. Anupama, P. Vinod et al., “Malware detection employed by visualization and deep neural network,” Computers & Security, vol. 105, Article ID 102247, 2021.

A.Yuan, J. Wang, D. Liu, W. Guo, P. Wu, and X. Bao, “Byte-level malware classification based on Markov images and deep learning,” Computers & Security, vol. 92, Article ID 101740, 2020.

R. Patil, H. Dudeja and C. Modi, "Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing", Int. J. Inf. Secur., vol. 19, pp. 147-162, 2020.