Malware threat analysis techniques and approaches for iot applications: A review
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer�s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances u...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
Institute of Advanced Engineering and Science
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-26530 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-265302023-05-29T17:11:37Z Malware threat analysis techniques and approaches for iot applications: A review Uchenna C.C. Jamil N. Ismail R. Yan L.K. Mohamed M.A. 57224217428 36682671900 15839357700 57222726159 57194596063 Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer�s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications. � 2021, Institute of Advanced Engineering and Science. All rights reserved. Final 2023-05-29T09:11:37Z 2023-05-29T09:11:37Z 2021 Article 10.11591/eei.v10i3.2423 2-s2.0-85107314882 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107314882&doi=10.11591%2feei.v10i3.2423&partnerID=40&md5=b944a2bae4d3bf2c1e805cf79dda3f78 https://irepository.uniten.edu.my/handle/123456789/26530 10 3 1558 1571 All Open Access, Gold, Green Institute of Advanced Engineering and Science Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer�s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications. � 2021, Institute of Advanced Engineering and Science. All rights reserved. |
author2 |
57224217428 |
author_facet |
57224217428 Uchenna C.C. Jamil N. Ismail R. Yan L.K. Mohamed M.A. |
format |
Article |
author |
Uchenna C.C. Jamil N. Ismail R. Yan L.K. Mohamed M.A. |
spellingShingle |
Uchenna C.C. Jamil N. Ismail R. Yan L.K. Mohamed M.A. Malware threat analysis techniques and approaches for iot applications: A review |
author_sort |
Uchenna C.C. |
title |
Malware threat analysis techniques and approaches for iot applications: A review |
title_short |
Malware threat analysis techniques and approaches for iot applications: A review |
title_full |
Malware threat analysis techniques and approaches for iot applications: A review |
title_fullStr |
Malware threat analysis techniques and approaches for iot applications: A review |
title_full_unstemmed |
Malware threat analysis techniques and approaches for iot applications: A review |
title_sort |
malware threat analysis techniques and approaches for iot applications: a review |
publisher |
Institute of Advanced Engineering and Science |
publishDate |
2023 |
_version_ |
1806423325838147584 |
score |
13.214268 |