Presented by Name: Roll No:: Bukke Pratap Kumar Naik 17121A0520
Presented by Name: Roll No:: Bukke Pratap Kumar Naik 17121A0520
Presented by Name: Roll No:: Bukke Pratap Kumar Naik 17121A0520
Presented by
• Malware detection:
– The conventional methods may solve code obfuscation
concerns, but high computational cost is needed
– How to identify malware with reduced overhead?
– How to extract malware features with less computational
cost?
– How to process big malware datasets to get better
accuracy?
• In this paper, we proposed a combined deep learning
approach to identify the pirated and Malware attacks on
industrial IoT cloud
OBJECTIVES
• For efficient threat detection in the IoT environment, more studies have
been conducted on malware detection and software plagiarism detection to
achieve high Identification performance, and reduce time cost.
• Several studies have observed the impact of different aspects of software
plagiarism detection
• Most of the previous work is complete on a single programming language
• , the author proposed a Source Forager search engine that was used to
extract like functionalities between C and C++code in response to user
questions
• the logic-based approach was used to compute the behavior of dissimilarity
in two source codes by the same inputs. If there was no dissimilarity, then it
originated in plagiarism problem
ALGORITHM OR TECHNIQUE
• POOLING LAYER
– The sub-sampling layer term is generally used for pooling layer which offers
two modes of pooling, i.e., maximum and avg pooling
– to minimize the loss incurred on the training data.
SOFTWARE PIRACY THREAT DETECTION
• PRE-PROCESSING AND FEATURE EXTRACTION
• DEEP LEARNING WITH TENSORFLOW FRAMEWORK
– The TensorFlow is a machine learning system which is used for high-level computations
in a complex environment.
– We can implement different types of machine and deep learning algorithms by calling
specific Application Programing Interface (API) of TensorFlow.
– It has different types of layers which can be configured for complex computations,
training the data, and supervise the state-run of each function
ALGORITHM OR TECHNIQUE
The highest F-measure obtained by the proposed method was 97.44%, GIST + SVM was
85.82%, LBP + SVM was 77.49%, and CLGM + SVM was
91.98% respectively.
CONCLUSION
• The industrial IoT based network is rapidly growing in the coming future
• The detection of software piracy and malware threats are the main
challenges in the field of cybersecurity using IoT-based big data
• We proposed a combined deep learning based approach for the
identification of pirated and malware file
• . The source code is preprocessed to clean from noise and to capture
further the high-quality features which include useful tokens
• Then, TFIDF and LogTF weighting techniques are used to zoom the
contribution of each token in terms of source code similarity
• a novel methodology based on convolution neural network and color
image visualization to detect malware using IoT.
REFERENCES