Open Access iconOpen Access



Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN)

Abeer Abdullah Alsadhan1, Abdullah A. Al-Atawi2, Hanen karamti3, Abid Jameel4, Islam Zada5, Tan N. Nguyen6,*

1 Computer Science Department, Imam Abdulrahman Bin Faisal University, Damam, 32232, Saudi Arabia
2 Department of Computer Science, Applied College, University of Tabuk, Tabuk, 47512, Saudi Arabia
3 Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P. O. Box 84428, Riyadh, 11671, Saudi Arabia
4 Department of Computer Sciences and Information Technology, Hazara University, Mansehra, Pakistan
5 Faculty of Computing, Department of Software Engineering, International Islamic University, Islamabad, Pakistan
6 Department of Architectural Engineering, Sejong University, Seoul, 05006, Korea

* Corresponding Author: Tan N. Nguyen. Email: email

Intelligent Automation & Soft Computing 2024, 39(2), 135-155.


IoT (Internet of Things) devices are being used more and more in a variety of businesses and for a variety of tasks, such as environmental data collection in both civilian and military situations. They are a desirable attack target for malware intended to infect specific IoT devices due to their growing use in a variety of applications and their increasing computational and processing power. In this study, we investigate the possibility of detecting IoT malware using recurrent neural networks (RNNs). RNN is used in the proposed method to investigate the execution operation codes of ARM-based Internet of Things apps (OpCodes). To train our algorithms, we employ a dataset of IoT applications that includes 281 malicious and 270 benign pieces of software. The trained model is then put to the test using 100 brand-new IoT malware samples across three separate LSTM settings. Model exposure was not previously conducted on these samples. Detecting newly crafted malware samples with 2-layer neurons had the highest accuracy (98.18%) in the 10-fold cross validation experiment. A comparison of the LSTM technique to other machine learning classifiers shows that it yields the best results.


Cite This Article

APA Style
Alsadhan, A.A., Al-Atawi, A.A., karamti, H., Jameel, A., Zada, I. et al. (2024). Malware attacks detection in iot using recurrent neural network (RNN). Intelligent Automation & Soft Computing, 39(2), 135-155.
Vancouver Style
Alsadhan AA, Al-Atawi AA, karamti H, Jameel A, Zada I, Nguyen TN. Malware attacks detection in iot using recurrent neural network (RNN). Intell Automat Soft Comput . 2024;39(2):135-155
IEEE Style
A.A. Alsadhan, A.A. Al-Atawi, H. karamti, A. Jameel, I. Zada, and T.N. Nguyen "Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN)," Intell. Automat. Soft Comput. , vol. 39, no. 2, pp. 135-155. 2024.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 188


  • 82


  • 0


Share Link