Rule-Based Approach to Detect IoT Malicious Files

3Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

The current immersive increase of cyber-attacks requires constant evolution of the used security solutions. Current malware detection solutions are only able to identify known malwares that were previously detected. They also lack the ability to deeply investigate every file in the system. Therefore, new detection techniques are needed to fill this gab. In this study, a flexible and an effective rule-based approach is proposed to detect malicious files by searching for specific types of strings that should not exist in normal legitimate files. The proposed detection technique relies on the use of LOKI as a scanning agent that uses customized YARA rules with different complexities to search for the needed strings. The proposed methodology has been tested and it detected all malwares successfully.

Cite

CITATION STYLE

APA

Alsattam, F., Al-Akhras, M., Almasri, M. M., & Alawairdhi, M. (2020). Rule-Based Approach to Detect IoT Malicious Files. Journal of Computer Science, 16(9), 1203–1211. https://doi.org/10.3844/jcssp.2020.1203.1211

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free