A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Springer Science and Business Media Deutschland GmbH
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-26573 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-265732023-05-29T17:12:12Z A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction Chimeleze C.U. Jamil N. Ismail R. Lam K.-Y. 57222127806 36682671900 15839357700 7403657062 Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware The Internet of Things (IoT) has been an immediate major turning point in information and communication technology as it gives room for connection and information sharing among numerous devices. Notwithstanding, malicious code attacks have exponentially increased, with malicious code variants ranked as a major threat in resource constrained devices in IoT environment thereby making the efficient malware variants detection a serious concern for researchers in recent years. The capacity to detect malware variants is essential for protection against security breaches, data theft and other dangers. Hence with the explosion of resource constrained devices for IoT applications, it becomes very important to document existing cutting-edge techniques developed to detect malware variants in these devices. In this paper, we have investigated extensively the implementation of malware variants detection models particularly in smartphones as a case study for resource constrained devices. The paper covers the current techniques for detection of malware variants, comprehensive assessment of the techniques and recommendations for future researches. � 2021, Springer Nature Singapore Pte Ltd. Final 2023-05-29T09:12:11Z 2023-05-29T09:12:11Z 2021 Conference Paper 10.1007/978-981-33-6835-4_24 2-s2.0-85101498137 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85101498137&doi=10.1007%2f978-981-33-6835-4_24&partnerID=40&md5=2eb3fb81e6d4c463ec023ba73fcddb06 https://irepository.uniten.edu.my/handle/123456789/26573 1347 354 370 Springer Science and Business Media Deutschland GmbH Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware |
author2 |
57222127806 |
author_facet |
57222127806 Chimeleze C.U. Jamil N. Ismail R. Lam K.-Y. |
format |
Conference Paper |
author |
Chimeleze C.U. Jamil N. Ismail R. Lam K.-Y. |
spellingShingle |
Chimeleze C.U. Jamil N. Ismail R. Lam K.-Y. A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction |
author_sort |
Chimeleze C.U. |
title |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction |
title_short |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction |
title_full |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction |
title_fullStr |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction |
title_full_unstemmed |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction |
title_sort |
review on malware variants detection techniques for threat intelligence in resource constrained devices: existing approaches, limitations and future direction |
publisher |
Springer Science and Business Media Deutschland GmbH |
publishDate |
2023 |
_version_ |
1806424178120720384 |
score |
13.214268 |