A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction

Collins Uchenna Chimeleze, Norziana Jamil, Roslan Ismail, Kwok Yan Lam

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The Internet of Things (IoT) has been an immediate major turning point in information and communication technology as it gives room for connection and information sharing among numerous devices. Notwithstanding, malicious code attacks have exponentially increased, with malicious code variants ranked as a major threat in resource constrained devices in IoT environment thereby making the efficient malware variants detection a serious concern for researchers in recent years. The capacity to detect malware variants is essential for protection against security breaches, data theft and other dangers. Hence with the explosion of resource constrained devices for IoT applications, it becomes very important to document existing cutting-edge techniques developed to detect malware variants in these devices. In this paper, we have investigated extensively the implementation of malware variants detection models particularly in smartphones as a case study for resource constrained devices. The paper covers the current techniques for detection of malware variants, comprehensive assessment of the techniques and recommendations for future researches.

Original languageEnglish
Title of host publicationAdvances in Cyber Security - Second International Conference, ACeS 2020, Revised Selected Papers
EditorsMohammed Anbar, Nibras Abdullah, Selvakumar Manickam
PublisherSpringer Science and Business Media Deutschland GmbH
Pages354-370
Number of pages17
ISBN (Print)9789813368347
DOIs
Publication statusPublished - 2021
Externally publishedYes
Event2nd International Conference on Advances in Cyber Security, ACeS 2020 - Penang, Malaysia
Duration: Dec 8 2020Dec 9 2020

Publication series

NameCommunications in Computer and Information Science
Volume1347
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference2nd International Conference on Advances in Cyber Security, ACeS 2020
Country/TerritoryMalaysia
CityPenang
Period12/8/2012/9/20

Keywords

  • Internet of Things
  • Malicious software
  • Malware variants
  • Resource constrained devices
  • Threat intelligence

ASJC Scopus subject areas

  • General Computer Science
  • General Mathematics

Fingerprint

Dive into the research topics of 'A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction'. Together they form a unique fingerprint.

Cite this