{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:06:22Z","timestamp":1776873982220,"version":"3.51.2"},"reference-count":47,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057648","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:30:16Z","timestamp":1733970616000},"page":"4691-4705","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["Backdoor Malware Detection in Industrial IoT Using Machine Learning"],"prefix":"10.32604","volume":"81","author":[{"given":"Maryam Mahsal","family":"Khan","sequence":"first","affiliation":[]},{"given":"Attaullah","family":"Buriro","sequence":"additional","affiliation":[]},{"given":"Tahir","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Subhan","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"8021","DOI":"10.1109\/JIOT.2019.2903242","article-title":"Secure industrial internet of things critical infrastructure node design","volume":"6","author":"Mcginthy","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/s22155836","article-title":"Key challenges and emerging technologies in industrial iot architectures: A review","volume":"22","author":"Mirani","year":"2022","journal-title":"Sensors"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TII.2020.3023507","article-title":"Challenges and opportunities in securing the industrial internet of things","volume":"17","author":"Serror","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-030-51473-0_10","author":"Ledwaba","year":"2021","journal-title":"Wireless Networks and Industrial IoT: Applications, Challenges and Enablers"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-023-01478-w","article-title":"IoT malware: An attribute-based taxonomy, detection mechanisms and challenges","volume":"16","author":"Victor","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.3390\/s22228697","article-title":"IBD: An interpretable backdoor-detection method via multivariate interactions","volume":"22","author":"Xu","year":"2022","journal-title":"Sensors"},{"key":"ref7","unstructured":"C. Yang, \u201cDetecting backdoored neural networks with structured adversarial attacks,\u201d 2021. Accessed: Sep. 10, 2024. [Online]. Available: https:\/\/www2.eecs.berkeley.edu\/Pubs\/TechRpts\/2021\/EECS-2021-90.pdf"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11060867","article-title":"Advanced intrusion detection combining signature-based and behavior-based detection methods","volume":"11","author":"Kwon","year":"2022","journal-title":"Electronics"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1109\/TR.2022.3159784","article-title":"Model agnostic defence against backdoor attacks in machine learning","volume":"71","author":"Udeshi","year":"2022","journal-title":"IEEE Trans. Reliab."},{"key":"ref10","first-page":"395","author":"Fu","year":"2023","journal-title":"Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use Cases and Emerging Challenges"},{"key":"ref11","first-page":"1","article-title":"Industrial internet of things: Challenges, opportunities, and directions","volume":"81","author":"Aazam","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref12","first-page":"102 109","article-title":"Security analysis of industrial internet of things: A review","volume":"7","author":"Almohri","year":"2019","journal-title":"IEEE Access"},{"key":"ref13","article-title":"Detecting malware in industrial IoT networks: A review","volume":"21","author":"Bisio","year":"2021","journal-title":"Sensors"},{"key":"ref14","article-title":"IoT security challenges and machine learning-based solutions: A survey","volume":"91","author":"Siddiqui","year":"2020","journal-title":"Comput. Secur."},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/2089125.2089126","article-title":"A survey on automated dynamic malware-analysis techniques and tools","volume":"44","author":"Egele","year":"2012","journal-title":"ACM Comput. Surv."},{"key":"ref16","series-title":"Proc. 2013 IEEE Symp. Secur. Priv. (SP)","first-page":"25","article-title":"Scalable, behavior-based malware clustering","author":"Ferrante","year":"2013"},{"key":"ref17","series-title":"Proc. 14th Int. Conf. Mach. Learn. Data Mini. Pattern Recognit. (MLDM)","first-page":"439","article-title":"Deep learning for classification of malware system call sequences","author":"Kolosnjaji","year":"2018"},{"key":"ref18","unstructured":"Kaggle, \u201cCCCS-CIC-AndMal-2020 dataset,\u201d 2020. Accessed: Sep. 10, 2024. [Online]. Available: https:\/\/www.kaggle.com\/ahmedmohamedashraf\/cic-andmal2020"},{"key":"ref19","series-title":"2021 Reconcil. Data Analyt., Automat., Priv. Secur.: A Big Data Challen. (RDAAPS)","first-page":"1","article-title":"EntropLyzer: Android malware classification and characterization using entropy analysis of dynamic characteristics","author":"Keyes","year":"2021"},{"key":"ref20","series-title":"Proc. 2020 10th Int. Conf. Commun. Netw. Secur., ICCNS \u201920","first-page":"70","article-title":"DIDroid: Android malware classification and characterization using deep image learning","author":"Rahali","year":"2021"},{"key":"ref21","unstructured":"S. B. Kotsiantis, D. N. Kanellopoulos, and P. E. Pintelas, \u201cHandling imbalanced datasets: A review,\u201d 2006. Accessed: Sep. 10, 2024. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:14354369"},{"key":"ref22","series-title":"Proc. 16th Midwest Artif. Intell. Cognit. Sci. Conf.","article-title":"Issues in mining imbalanced data sets-a review paper","author":"Visa","year":"2005"},{"key":"ref23","first-page":"321","article-title":"SMOTE: Synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"Jun. 2002","journal-title":"J. Artif. Int. Res."},{"key":"ref24","unstructured":"I. J. Goodfellow et al., \u201cGenerative adversarial networks,\u201d 2014, arXiv:1406.2661."},{"key":"ref25","series-title":"IEEE Int. Conf. Data Sci. Adv. Anal. (DSAA)","first-page":"399","article-title":"The synthetic data vault","author":"Patki","year":"Oct. 2016"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.3390\/info15040194","article-title":"An incremental mutual information-selection technique for early ransomware detection","volume":"15","author":"Gazzan","year":"2024","journal-title":"Information"},{"key":"ref27","first-page":"23","article-title":"A machine learning model for malware detection using recursive feature elimination (RFE) for feature selection and ensemble technique","volume":"24","author":"Sani Mahmoud","year":"2022","journal-title":"IOSR J. Comput. Eng."},{"key":"ref28","series-title":"2020 IEEE Reg. 10 Conf. (TENCON)","first-page":"864","article-title":"Javascript malware behaviour analysis and detection using sandbox assisted ensemble model","author":"Kishore","year":"2020"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","article-title":"Exploring permission-induced risk in android applications for malicious application detection","volume":"9","author":"Wang","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.neucom.2020.12.088","article-title":"Android malware detection through machine learning on kernel task structures","volume":"435","author":"Wang","year":"2021","journal-title":"Neurocomputing"},{"key":"ref31","series-title":"2022 24th Int. Conf. Adv. Commun. Technol. (ICACT)","first-page":"435","article-title":"Android malware detection: Investigating the impact of imbalanced data-sets on the performance of machine learning models","author":"Sawadogo","year":"2022"},{"key":"ref32","series-title":"Proc. 12th ACM Workshop Artif. Intell. Secur., AISec\u201919","first-page":"37","article-title":"Malware detection on highly imbalanced data through sequence modeling","author":"Oak","year":"2019"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.123109","article-title":"A malware detection model based on imbalanced heterogeneous graph embeddings","volume":"246","author":"Li","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"ref34","unstructured":"X. Hu et al., \u201cCost sensitive gnn-based imbalanced learning for mobile social network fraud detection,\u201d 2023, arXiv:2303.17486."},{"key":"ref35","first-page":"13","author":"Yap","year":"2014","journal-title":"Proc. First Int. Conf. Adv. Data Inform. Eng. (DaEng-2013)"},{"key":"ref36","series-title":"Int. Conf. Intell. Data Eng. Automat. Learn.","first-page":"104","article-title":"Benchmarking data augmentation techniques for tabular data","author":"Machado","year":"2022"},{"key":"ref37","unstructured":"M. Fallahian, M. Dorodchi, and K. Kreth, \u201cGAN-based tabular data generator for constructing synopsis in approximate query processing: Challenges and solutions,\u201d 2022, arXiv:2212.09015."},{"key":"ref38","series-title":"Proc. 3rd ACM Workshop Wireless Secur. Mach. Learn.","first-page":"85","article-title":"SWIPEGAN: Swiping data augmentation using generative adversarial networks for smartphone user authentication","author":"Buriro","year":"2021"},{"key":"ref39","unstructured":"Y. Elor and H. Averbuch-Elor, \u201cTo smote, or not to smote?\u201d 2022, arXiv:2201.08528."},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.3390\/electronics10243124","article-title":"A method for class-imbalance learning in android malware detection","volume":"10","author":"Guan","year":"2021","journal-title":"Electronics"},{"key":"ref41","first-page":"1","article-title":"An empirical assessment of smote variants techniques and interpretation methods in improving the accuracy and the interpretability of student performance models","volume":"29","author":"Sahlaoui","year":"2023","journal-title":"Educ. Inform. Technol."},{"key":"ref42","series-title":"2023 IEEE 21st Int. Conf. Indust. Inform. (INDIN)","first-page":"1","article-title":"Generation of synthetic data to improve security monitoring for cyber-physical production systems","author":"Specht","year":"2023"},{"key":"ref43","author":"Xu","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105669","article-title":"Imbalanced tabular data modelization using ctgan and machine learning to improve iot botnet attacks detection","volume":"118","author":"Habibi","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103604","article-title":"SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM","volume":"137","author":"Li","year":"2024","journal-title":"Comput. Secur."},{"key":"ref46","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","article-title":"A systematic analysis of performance measures for classification tasks","volume":"45","author":"Sokolova","year":"2009","journal-title":"Inform. Process. Manag."},{"key":"ref47","series-title":"2008 Eighth IEEE Int. Conf. Data Min.","first-page":"413","article-title":"Isolation forest","author":"Liu","year":"2008"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59047\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:08:03Z","timestamp":1741327683000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057648","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}