Smart City Gnosys

Smart city article details

Title Enhancing Smart Iot Malware Detection: A Ghostnet-Based Hybrid Approach
ID_Doc 23976
Authors Almazroi A.A.; Ayub N.
Year 2023
Published Systems, 11, 11
DOI http://dx.doi.org/10.3390/systems11110547
Abstract The Internet of Things (IoT) constitutes the foundation of a deeply interconnected society in which objects communicate through the Internet. This innovation, coupled with 5G and artificial intelligence (AI), finds application in diverse sectors like smart cities and advanced manufacturing. With increasing IoT adoption comes heightened vulnerabilities, prompting research into identifying IoT malware. While existing models excel at spotting known malicious code, detecting new and modified malware presents challenges. This paper presents a novel six-step framework. It begins with eight malware attack datasets as input, followed by insights from Exploratory Data Analysis (EDA). Feature engineering includes scaling, One-Hot Encoding, target variable analysis, feature importance using MDI and XGBoost, and clustering with K-Means and PCA. Our GhostNet ensemble, combined with the Gated Recurrent Unit Ensembler (GNGRUE), is trained on these datasets and fine-tuned using the Jaya Algorithm (JA) to identify and categorize malware. The tuned GNGRUE-JA is tested on malware datasets. A comprehensive comparison with existing models encompasses performance, evaluation criteria, time complexity, and statistical analysis. Our proposed model demonstrates superior performance through extensive simulations, outperforming existing methods by around 15% across metrics like AUC, accuracy, recall, and hamming loss, with a 10% reduction in time complexity. These results emphasize the significance of our study’s outcomes, particularly in achieving cost-effective solutions for detecting eight malware strains. © 2023 by the authors.
Author Keywords classification; deep learning; GhostNet; Internet of Things; Jaya Algorithm; malware detection; optimization methods


Similar Articles


Id Similarity Authors Title Published
6993 View0.91Alhamdi M.J.M.; Lopez-Guede J.M.; AlQaryouti J.; Rahebi J.; Zulueta E.; Fernandez-Gamiz U.Ai-Based Malware Detection In Iot Networks Within Smart Cities: A SurveyComputer Communications, 233 (2025)
2549 View0.889Ronghua M.A.A Method By Utilizing Deep Learning To Identify Malware Within Numerous Industrial Sensors On IotsInternational Journal of Advanced Computer Science and Applications, 15, 8 (2024)
11168 View0.888Dong H.; Kotenko I.Autoencoder-Based Malware Analysis: An Imagery Analysis Approach To Enhance The Security Of Smart City IotACM International Conference Proceeding Series (2023)
35958 View0.886Lefoane M.; Ghafir I.; Kabir S.; Awan I.-U.Machine Learning For Botnet Detection: An Optimized Feature Selection ApproachACM International Conference Proceeding Series (2021)
34135 View0.884Rattanalerdnusorn E.; Pattaranantakul M.; Thaenkaew P.; Vorakulpipat C.Iotdept: Detecting Security Threats And Pinpointing Anomalies In An Iot EnvironmentACM International Conference Proceeding Series (2020)
35268 View0.883Negera W.G.; Schwenker F.; Debelee T.G.; Melaku H.M.; Feyisa D.W.Lightweight Model For Botnet Attack Detection In Software Defined Network-Orchestrated IotApplied Sciences (Switzerland), 13, 8 (2023)
34132 View0.878Ashraf, J; Keshk, M; Moustafa, N; Abdel-Basset, M; Khurshid, H; Bakhshi, AD; Mostafa, RRIotbot-Ids: A Novel Statistical Learning-Enabled Botnet Detection Framework For Protecting Networks Of Smart CitiesSUSTAINABLE CITIES AND SOCIETY, 72 (2021)
5280 View0.876Kumar Yadav R.; Karamveer K.A Survey On Iot Botnets And Their Detection ApproachesProceedings - 2022 4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022 (2022)
39592 View0.875Shafin S.S.; Karmakar G.; Mareels I.Obfuscated Memory Malware Detection In Resource-Constrained Iot Devices For Smart City ApplicationsSensors, 23, 11 (2023)
36080 View0.874Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)