Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

IoT malware classification based on reinterpreted function-call graphs

CY Wu, T Ban, SM Cheng, T Takahashi, D Inoue - Computers & Security, 2023 - Elsevier
Various malware and cyberattacks have arisen along with the proliferation of IoT devices.
The evolving malware targeting IoT devices calls forth effective and efficient solutions to …

On the effectiveness of image processing based malware detection techniques

CV Bijitha, HV Nath - Cybernetics and Systems, 2022 - Taylor & Francis
The number of cyberattack incidents is undeniably growing by the day, with malware attacks
being the significant contributor. Whether it is from worms, Trojan horses, or ransomware …

Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines?

T Takahashi, Y Umemura, C Han, T Ban… - … and other Affiliated …, 2021 - ieeexplore.ieee.org
To cope with growing cyber threats on the Internet, various techniques have been proposed
and implemented. Each of these techniques automates specific tasks of cybersecurity …

IoT malware detection using function-call-graph embedding

CY Wu, T Ban, SM Cheng, B Sun… - … Conference on Privacy …, 2021 - ieeexplore.ieee.org
In the era of rapid network development, IoT devices are being deployed more and more
widely, and various kinds of malware programs are gradually appearing at the deployment …

A hybrid method for analysis and detection of malicious executables in IoT network

SSB Subrahmanyam, P Goutham, VKR Ambati… - Computers & …, 2023 - Elsevier
In 2020, 639 million IoT devices were breached, but the number has almost doubled to 1.51
billion breached devices in just the first half of 2021. The limited computing capacity of IoT …

Scalable and fast algorithm for constructing phylogenetic trees with application to IoT malware clustering

T He, C Han, R Isawa, T Takahashi, S Kijima… - IEEE …, 2023 - ieeexplore.ieee.org
With the development of IoT devices, there is a rapid increase in new types of IoT malware
and variants, causing social problems. The malware's phylogenetic tree has been used in …

An automated behaviour-based clustering of IoT botnets

T Trajanovski, N Zhang - Future Internet, 2021 - mdpi.com
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet
variants, some of which are equipped with new capabilities and may be difficult to detect …

Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware

K Nakao, K Yoshioka, T Sasaki, R Tanabe… - … on Information and …, 2023 - search.ieice.org
In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the
loose, analyzed IoT malware with new features such as persistent infection, developed …

Scalable and fast hierarchical clustering of IoT malware using active data selection

T He, C Han, T Takahashi, S Kijima… - … Conference on Fog …, 2021 - ieeexplore.ieee.org
The number of IoT malware specimens has in-creased rapidly and diversified in recent
years. To efficiently analyze a large number of malware specimens, we aim to reduce the …