JOURNAL ARTICLE

Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach

Farhan UllahHamad NaeemSohail JabbarShehzad KhalidMuhammad Ahsan LatifFadi Al‐TurjmanLeonardo Mostarda

Year: 2019 Journal:   IEEE Access Vol: 7 Pages: 124379-124389   Publisher: Institute of Electrical and Electronics Engineers

Abstract

The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they continuously offer services in the organization. Currently, software piracy and malware attacks are high risks to compromise the security of IoT. These threats may steal important information that causes economic and reputational damages. In this paper, we have proposed a combined deep learning approach to detect the pirated software and malware-infected files across the IoT network. The TensorFlow deep neural network is proposed to identify pirated software using source code plagiarism. The tokenization and weighting feature methods are used to filter the noisy data and further, to zoom the importance of each token in terms of source code plagiarism. Then, the deep learning approach is used to detect source code plagiarism. The dataset is collected from Google Code Jam (GCJ) to investigate software piracy. Apart from this, the deep convolutional neural network is used to detect malicious infections in IoT network through color image visualization. The malware samples are obtained from Maling dataset for experimentation. The experimental results indicate that the classification performance of the proposed solution to measure the cybersecurity threats in IoT are better than the state of the art methods.

Keywords:
Computer science Malware Computer security Deep learning Convolutional neural network Blacklisting Software Source code Artificial intelligence Operating system

Metrics

240
Cited By
20.19
FWCI (Field Weighted Citation Impact)
59
Refs
1.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems
Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.