Abstract

AbstractA malware detection algorithm that can be embedded in IoT edge computing is proposed in this study and validated using an emulator. This algorithm, with a pattern match accelerator, reduces the computing cost while maintaining a relatively high detection accuracy. For autonomous driving, complicated IoT edge computing must have a huge amount of embedded program codes. In such a situation, the invasion of malware can lead to compromised cybersecurity. In this study, a pattern match accelerator is implemented for such issues, thereby offering IoT edge computing that detects malware automatically. Edge computing is designed to apply simply structural level analysis algorithms using HLAC mask pattern. We developed a pseudo‐emulator system environment and conducted performance confirmation of the proposed technique using 641 chosen samples from six types of malware families. The algorithm's efficiencies demonstrated an identification performance of approximately 80%. In comparison to characteristic extraction using AI, the computing cost was reduced and these processes enable edge computing with high cybersecurity features.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.