Abstract
With advanced 5 G/6 G networks, data-driven interconnected devices will increase exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure information extraction to apply digital services, medical diagnoses and financial forecasting. This introduction of high-speed network mobile applications will also adapt. As a consequence, the scale and complexity of Android malware are rising. Detection of malware classification vulnerable to attacks. A fabricate feature can force misclassification to produce the desired output. This study proposes a subset feature selection method to evade fabricated attacks in the IIOT environment. The method extracts application-aware features from a single android application to train an independent classification model. Ensemble-based learning is then used to train the distinct classification models. Finally, the collaborative ML classifier makes independent decisions to fight against adversarial evasion attacks. We compare and evaluate the benchmark Android malware dataset. The proposed method achieved 91% accuracy with 14 fabricated input features.
Original language | English |
---|---|
Pages (from-to) | 960-968 |
Number of pages | 9 |
Journal | IEEE Transactions on Industrial Informatics |
Volume | 19 |
Issue number | 1 |
Early online date | 7 Jul 2022 |
DOIs | |
Publication status | Published - 1 Jan 2023 |
Keywords
- Adversarial attacks
- Analytical models
- Feature extraction
- Industrial Internet of Things
- Malware
- Object recognition
- Smart phones
- Static analysis
- android
- industrial internet of things (IIoT)
- malware