Show simple item record

AuthorFaria, Nawshin
AuthorUnal, Devrim
AuthorHammoudeh, Mohammad
AuthorSuganthan, Ponnuthurai N.
Available date2025-01-19T10:05:05Z
Publication Date2024
Publication NameAd Hoc Networks
ResourceScopus
Identifierhttp://dx.doi.org/10.1016/j.adhoc.2024.103523
ISSN15708705
URIhttp://hdl.handle.net/10576/62218
AbstractThe widespread usage of Android-powered devices in the Internet of Things (IoT) makes them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks, such as smart watches, smart thermometers, biosensors, and more, are powered by the Android operating system, where preserving the privacy of user-sensitive data is of utmost importance. Detecting Android malware is thus vital for protecting sensitive information and ensuring the reliability of IoT networks. This article focuses on AI-enabled Android malware detection for improving zero trust security in IoT networks, which requires Android applications to be verified and authenticated before providing access to network resources. The zero trust security model requires strict identity verification for every entity trying to access resources on a private network, regardless of whether they are inside or outside the network perimeter. Our proposed solution, DP-RFECV-FNN, an innovative approach to Android malware detection that employs Differential Privacy (DP) within a Feedforward Neural Network (FNN) designed for IoT networks under the zero trust model. By integrating DP, we ensure the confidentiality of data during the detection process, setting a new standard for privacy in cybersecurity solutions. By combining the strengths of DP and zero trust security with the powerful learning capacity of the FNN, DP-RFECV-FNN demonstrates the ability to identify both known and novel malware types and achieves higher accuracy while maintaining strict privacy controls compared with recent papers. DP-RFECVFNN achieves an accuracy ranging from 97.78% to 99.21% while utilizing static features and 93.49% to 94.36% for dynamic features of Android applications to detect whether it is malware or benign. These results are achieved under varying privacy budgets, ranging from 𝜖 = 0.1 to 𝜖 = 1.0. Furthermore, our proposed feature selection pipeline enables us to outperform the state-of-the-art by significantly reducing the number of selected features and training time while improving accuracy. To the best of our knowledge, this is the first work to categorize Android malware based on both static and dynamic features through a privacy-preserving neural network model.
SponsorOpen Access funding provided by the Qatar National Library.
Languageen
PublisherElsevier
SubjectAndroid malware detection
Differential Privacy
Malware category classification
Privacy budget
Privacy-preserving machine learning
Zero trust
TitleAI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks
TypeArticle
Volume Number161
dc.accessType Full Text


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record