Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 15 , Issue 2 , PP: 221-244, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities

Alaa Q. Raheema 1 , Massila Kamalrudin 2 , Nur Rachman Dzakiyullah 3 *

  • 1 Civil Engineering Department, University of Technology, Baghdad, Iraq - (40345@uotechnology.edu.iq)
  • 2 Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia - (massila@utem.edu.my)
  • 3 Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia; Faculty of Computer and Engineering, Department of Information System, Universitas Alma Ata, Yogyakarta, Indonesia - (nurrachmandzakiyullah@almaata.ac.id)
  • Doi: https://doi.org/10.54216/FPA.150220

    Received: August 08, 2023 Revised: December 16, 2023 Accepted: April 09, 2024
    Abstract

    In smart cities, the widespread adoption of Information and Communication Technologies (ICTs) presents both opportunities and challenges for security. While ICTs enable increased productivity, data sharing, and improved citizen services, they also create new vulnerabilities for malicious actors to exploit. This necessitates robust host-based security solutions to protect critical infrastructure and data. This paper proposes a novel multi-level fusion approach for enhanced host-based malware detection in ICT-enabled smart cities. By leveraging diverse data sources and employing advanced fusion techniques, our approach achieves significant improvements in malware detection accuracy, network evaluation, and security analysis compared to existing methods. Specifically, our proposed approach demonstrates a 72.1% malware detection rate across various attack scenarios, 69.7% accuracy in host network evaluation, 82.8% reduction in security analysis error, 75.4% accuracy in network probability detection, and an overall accuracy of 67.2%. These results showcase the potential of multi-level fusion for strengthening host-based security in smart cities. This approach offers several advantages over traditional host-based security solutions. Firstly, it provides more comprehensive threat detection by utilizing multiple data sources. Secondly, it reduces the burden on IT administrators by automating security analysis and decision-making. Finally, it enables continuous improvement through adaptive learning and feedback mechanisms. Overall, our multi-level fusion approach represents a promising advancement in host-based security for ICT-enabled smart cities. It offers significant improvements in accuracy and efficiency, paving the way for a more secure and resilient urban environment.

    Keywords :

    Smart City , Host Security , Malware Protection , Technological Development , Information and Communication Technology.

    References

    [1]    Darch Abed Dawar, A. (2024). Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks. International Journal of Mathematics, Statistics, and Computer Science, 2, 183–198. https://doi.org/10.59543/ijmscs.v2i.9073

    [2]    Lata, S., & Singh, D. (2022). Intrusion detection system in cloud environment: Literature survey & future research directions. International Journal of Information Management Data Insights2(2), 100134.

    [3]    Mahbub, M. (2020). Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics. Journal of Network and Computer Applications, 168, 102761

    [4]    Noor, Z., Hina, S., Hayat, F., & Shah, G. A. (2023). An Intelligent Context-Aware Threat Detection and Response Model for Smart Cyber-Physical Systems. Internet of Things, 100843.

    [5]    Kure, H. I., Islam, S., & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications34(18), 15241-15271.

    [6]    Noor, Z., Hina, S., Hayat, F., & Shah, G. A. (2023). An Intelligent Context-Aware Threat Detection and Response Model for Smart Cyber-Physical Systems. Internet of Things, 100843.

    [7]    Lehmann, D., Kinder, J., & Pradel, M. (2020). Everything Old is New Again: Binary Security of {WebAssembly}. In 29th USENIX Security Symposium (USENIX Security 20) (pp. 217-234).

    [8]    Zhang, H., Wang, B., Yu, X., Li, J., Shang, J., & Yu, J. (2020). Carbon dots in porous materials: host–guest synergy for enhanced performance. Angewandte Chemie, 132(44), 19558-19570.

    [9]    Bjørkhaug, I. (2020). Revisiting the refugee–host relationship in Nakivale Refugee Settlement: A dialogue with the Oxford Refugee Studies Centre. Journal on Migration and Human Security, 8(3), 266-281.

    [10] Labuda, P. I. (2020). UN Peacekeeping as intervention by invitation: host state consent and the use of force in Security Council-mandated stabilisation operations. Journal on the use of force and international law, 7(2), 317-356.

    [11] Monebhurrun, N. (2020). Diligentia quam in suis as a Technique for a Contextual Application of the Full Protection and Security Standard: Considering the Level of Development of Host States in International Investment Law. African Journal of International and Comparative Law, 28(4), 596-611.

    [12] Ou, Y., Zhou, W., Zhu, Z., Ma, F., Zhou, R., Su, F., ... & Liang, H. (2020). Host Differential Sensitisation toward Color/Lifetime‐Tuned Lanthanide Coordination Polymers for Optical Multiplexing. Angewandte Chemie International Edition, 59(52), 23810-23816.

    [13] Rao, P. M., & Deebak, B. D. (2022). Security and privacy issues in smart cities/industries: Technologies, applications, and challenges. Journal of Ambient Intelligence and Humanized Computing, 1-37.

    [14] Manogaran, G., Alazab, M., Shakeel, P. M., & Hsu, C. H. (2021). Blockchain assisted secure data sharing model for Internet of Things based smart industries. IEEE Transactions on Reliability, 71(1), 348-358.

    [15] Stergiopoulos, G., Lygerou, E., Tsalis, N., Tomaras, D., & Gritzalis, D. (2020). Avoiding Network and Host Detection using Packet Bit-masking. In ICETE (2) (pp. 52-63).

    [16] Chen, X. (2020). Pathogens which threaten food security: Puccinia striiformis, the wheat stripe rust pathogen. Food Security, 12(2), 239-251.

    [17] Neef, A. (2020). Legal and social protection for migrant farm workers: lessons from COVID-19. Agriculture and Human Values, 37(3), 641-642.

    [18] Zhang, J. (2022, April). Design of Campus Network Security System Based on Network Information Security. In 2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC) (pp. 1194-1197). IEEE.

    [19] Jiang, J. (2021, May). Research on Application of Idc Virtualization Security Technology Based on Host Whitelist Protection. In Journal of Physics: Conference Series (Vol. 1915, No. 3, p. 032011). IOP Publishing.

    [20] Abd El-Latif, A. A., Abd-El-Atty, B., Elseuofi, S., Khalifa, H. S., Alghamdi, A. S., Polat, K., & Amin, M. (2020). Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications, 541, 123687.

    [21] Alqahtani, H., Sarker, I. H., Kalim, A., Hossain, M., Md, S., Ikhlaq, S., & Hossain, S. (2020, March). Cyber intrusion detection using machine learning classification techniques. In International Conference on Computing Science, Communication and Security (pp. 121-131). Springer, Singapore.

    [22] McLaughlin, M. (2020). State-Owned Enterprises and Threats to National Security Under Investment Treaties. Chinese Journal of International Law, 19(2), 283-327.

    [23] Mombeuil, C. (2020). An exploratory investigation of factors affecting and best predicting the renewed adoption of mobile wallets. Journal of Retailing and Consumer Services, 55, 102127.

    [24] Mahbub, M. (2020). Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics. Journal of Network and Computer Applications, 168, 102761.

    [25] Geffre, A. C., Gernat, T., Harwood, G. P., Jones, B. M., Gysi, D. M., Hamilton, A. R., ... & Dolezal, A. G. (2020). Honey bee virus causes context-dependent changes in host social behavior. Proceedings of the National Academy of Sciences, 117(19), 10406-10413.

    [26] Tian, R., Yang, Z., & Shao, Q. (2020). Effects of host country resource endowment and labor cost on China's investment in overseas cultivated land. Environmental Science and Pollution Research, 27(36), 45282-45296.

    [27] Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud storage: A survey. IEEE Access, 8, 131723-131740.

    [28] Li, Y., Yao, S., Zhang, R., & Yang, C. (2021). Analysing host security using D‐S evidence theory and multisource information fusion. International Journal of Intelligent Systems, 36(2), 1053-1068.

    [29] Hauser, F., Schmidt, M., Häberle, M., & Menth, M. (2020). P4-MACsec: Dynamic topology monitoring and data layer protection with MACsec in P4-based SDN. IEEE Access, 8, 58845-58858.

    [30] Zaballa, E. O., Franco, D., Zhou, Z., & Berger, M. S. (2020, February). P4Knocking: Offloading host-based firewall functionalities to the network. In 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) (pp. 7-12). IEEE.

    [31] Gassais, R., Ezzati-Jivan, N., Fernandez, J. M., Aloise, D., & Dagenais, M. R. (2020). Multi-level host-based intrusion detection system for internet of things. Journal of Cloud Computing, 9(1), 1-16.

    [32] Liu, J., Zhang, W., Ma, T., Tang, Z., Xie, Y., Gui, W., & Niyoyita, J. P. (2020). Toward security monitoring of industrial cyber-physical systems via hierarchically distributed intrusion detection. Expert Systems with Applications, 158, 113578.

    [33] Oyewole, S. (2020). Civil-military Relations: Conflict and Cooperation between Military Bases and Host Communities in Nigeria. African Security, 13(4), 353-379.

    [34] Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642.

    [35] Rahman, M. T., Tajik, S., Rahman, M. S., Tehranipoor, M., & Asadizanjani, N. (2020, December). The key is left under the mat: On the inappropriate security assumption of logic locking schemes. In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (pp. 262-272). IEEE.

    [36] Al-Otum, H. M. (2020). Secure and robust host-adapted color image watermarking using inter-layered wavelet-packets. Journal of Visual Communication and Image Representation, 66, 102726.

    [37] Dubey, A., Cammarota, R., & Aysu, A. (2020, December). Maskednet: The first hardware inference engine aiming power side-channel protection. In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (pp. 197-208). IEEE.

    [38] Haas, S., Sommer, R., & Fischer, M. (2020, September). Zeek-osquery: Host-network correlation for advanced monitoring and intrusion detection. In IFIP International Conference on ICT Systems Security and Privacy Protection (pp. 248-262). Springer, Cham.

    [39] Lee, J. M., & Hong, S. (2020). Keeping host sanity for security of the SCADA systems. IEEE Access, 8, 62954-62968.

    [40] https://www.kaggle.com/datasets/katehighnam/beth-dataset

    [41] M. El El-Taie and A. Y. Y.Kraidi, “Blockchain Meets Edge Intelligence for Smart Cities Sustainability: An Insightful Review and Prospective Analysis,” J. Cybersecurity Inf. Manag., vol. 12, no. 1, pp. 50–61, 2023, doi: 10.54216/JCIM.120105.

    [42] A. Z. Abualkishik and R. Almajed, “Managing Information Security Risks in the Age of IoT,” J. Cybersecurity Inf. Manag., vol. 11, no. 01, pp. 30–37, 2023, doi: 10.54216/JCIM.110103.

    [43] A. Aziz, S. Mirzaliev, and Y. Maqsudjon, “Real-time Monitoring of Activity Recognition in Smart Homes: An Intelligent IoT Framework,” J. Intell. Syst. Internet Things, vol. 10, no. 1, pp. 76–83, 2023, doi: 10.54216/JISIoT.100106.

    [44] F. V. Naranjo, S. M. Vivar, E. J. Arias, and R. Atassi, “Early Energy Consumption Prediction as a Key Element in Smart City Sustainability,” J. Intell. Syst. Internet Things, vol. 11, no. 1, pp. 12–20, 2024, doi: 10.54216/JISIoT.110102.

    [45] A. Mosa and A. Abdelaziz, “A Survey on Web Service Discovery Approaches,” Fusion Pract. Appl., vol. 5, no. 2, pp. 53–60, 2021, doi: 10.54216/FPA.050202.

    [46] A. A. Elngar, K. M. Sagayam, and A. A. Elngar, “Augmenting security for electronic patient health record (ePHR) monitoring system using cryptographic key management schemes,” Fusion Pract. Appl., vol. 5, no. 2, pp. 42–52, 2021, doi: 10.54216/FPA.050201.

    [47] M. El El-Taie and A. Y. Y.Kraidi, “A Deep Learning Framework for Securing IoT Against Malwares,” J. Cybersecurity Inf. Manag., vol. 11, no. 01, pp. 38–46, 2023, doi: 10.54216/JCIM.110104.

     

     

    Cite This Article As :
    Q., Alaa. , Kamalrudin, Massila. , Rachman, Nur. Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities. Fusion: Practice and Applications, vol. , no. , 2024, pp. 221-244. DOI: https://doi.org/10.54216/FPA.150220
    Q., A. Kamalrudin, M. Rachman, N. (2024). Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities. Fusion: Practice and Applications, (), 221-244. DOI: https://doi.org/10.54216/FPA.150220
    Q., Alaa. Kamalrudin, Massila. Rachman, Nur. Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities. Fusion: Practice and Applications , no. (2024): 221-244. DOI: https://doi.org/10.54216/FPA.150220
    Q., A. , Kamalrudin, M. , Rachman, N. (2024) . Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities. Fusion: Practice and Applications , () , 221-244 . DOI: https://doi.org/10.54216/FPA.150220
    Q. A. , Kamalrudin M. , Rachman N. [2024]. Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities. Fusion: Practice and Applications. (): 221-244. DOI: https://doi.org/10.54216/FPA.150220
    Q., A. Kamalrudin, M. Rachman, N. "Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities," Fusion: Practice and Applications, vol. , no. , pp. 221-244, 2024. DOI: https://doi.org/10.54216/FPA.150220