Khan, Maryam Mahsal and Buriro, Attaullah and Ahmad, Tahir and Ullah, Subhan (2024) Backdoor Malware Detection in Industrial IoT Using Machine Learning. Computers, Materials and Continua, 81 (3). pp. 4691-4705. DOI https://doi.org/10.32604/cmc.2024.057648
Khan, Maryam Mahsal and Buriro, Attaullah and Ahmad, Tahir and Ullah, Subhan (2024) Backdoor Malware Detection in Industrial IoT Using Machine Learning. Computers, Materials and Continua, 81 (3). pp. 4691-4705. DOI https://doi.org/10.32604/cmc.2024.057648
Khan, Maryam Mahsal and Buriro, Attaullah and Ahmad, Tahir and Ullah, Subhan (2024) Backdoor Malware Detection in Industrial IoT Using Machine Learning. Computers, Materials and Continua, 81 (3). pp. 4691-4705. DOI https://doi.org/10.32604/cmc.2024.057648
Abstract
With the ever-increasing continuous adoption of Industrial Internet of Things (IoT) technologies, security concerns have grown exponentially, especially regarding securing critical infrastructures. This is primarily due to the potential for backdoors to provide unauthorized access, disrupt operations, and compromise sensitive data. Backdoors pose a significant threat to the integrity and security of Industrial IoT setups by exploiting vulnerabilities and bypassing standard authentication processes. Hence its detection becomes of paramount importance. This paper not only investigates the capabilities of Machine Learning (ML) models in identifying backdoor malware but also evaluates the impact of balancing the dataset via resampling techniques, including Synthetic Minority Oversampling Technique (SMOTE), Synthetic Data Vault (SDV), and Conditional Tabular Generative Adversarial Network (CTGAN), and feature reduction such as Pearson correlation coefficient, on the performance of the ML models. Experimental evaluation on the CCCS-CIC-AndMal-2020 dataset demonstrates that the Random Forest (RF) classifier generated an optimal model with 99.98% accuracy when using a balanced dataset created by SMOTE. Additionally, the training and testing time was reduced by approximately 50% when switching from the full feature set to a reduced feature set, without significant performance loss.
| Item Type: | Article |
|---|---|
| Uncontrolled Keywords: | Industrial IoT, backdoor malware, machine learning, CCCS-CIC-AndMal-2020, security, detection, critical infrastructure |
| Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
| SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
| Depositing User: | Unnamed user with email elements@essex.ac.uk |
| Date Deposited: | 21 Apr 2026 10:49 |
| Last Modified: | 21 Apr 2026 10:49 |
| URI: | http://repository.essex.ac.uk/id/eprint/40870 |
Available files
Filename: Backdoor Malware Detection in Industrial IoT Using Machine Learning.pdf
Licence: Creative Commons: Attribution 4.0