A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction

Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware

Saved in:
Bibliographic Details
Main Authors: Chimeleze C.U., Jamil N., Ismail R., Lam K.-Y.
Other Authors: 57222127806
Format: Conference Paper
Published: Springer Science and Business Media Deutschland GmbH 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
id my.uniten.dspace-26573
record_format dspace
spelling my.uniten.dspace-265732023-05-29T17:12:12Z A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction Chimeleze C.U. Jamil N. Ismail R. Lam K.-Y. 57222127806 36682671900 15839357700 7403657062 Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware The Internet of Things (IoT) has been an immediate major turning point in information and communication technology as it gives room for connection and information sharing among numerous devices. Notwithstanding, malicious code attacks have exponentially increased, with malicious code variants ranked as a major threat in resource constrained devices in IoT environment thereby making the efficient malware variants detection a serious concern for researchers in recent years. The capacity to detect malware variants is essential for protection against security breaches, data theft and other dangers. Hence with the explosion of resource constrained devices for IoT applications, it becomes very important to document existing cutting-edge techniques developed to detect malware variants in these devices. In this paper, we have investigated extensively the implementation of malware variants detection models particularly in smartphones as a case study for resource constrained devices. The paper covers the current techniques for detection of malware variants, comprehensive assessment of the techniques and recommendations for future researches. � 2021, Springer Nature Singapore Pte Ltd. Final 2023-05-29T09:12:11Z 2023-05-29T09:12:11Z 2021 Conference Paper 10.1007/978-981-33-6835-4_24 2-s2.0-85101498137 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85101498137&doi=10.1007%2f978-981-33-6835-4_24&partnerID=40&md5=2eb3fb81e6d4c463ec023ba73fcddb06 https://irepository.uniten.edu.my/handle/123456789/26573 1347 354 370 Springer Science and Business Media Deutschland GmbH Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware
author2 57222127806
author_facet 57222127806
Chimeleze C.U.
Jamil N.
Ismail R.
Lam K.-Y.
format Conference Paper
author Chimeleze C.U.
Jamil N.
Ismail R.
Lam K.-Y.
spellingShingle Chimeleze C.U.
Jamil N.
Ismail R.
Lam K.-Y.
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
author_sort Chimeleze C.U.
title A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
title_short A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
title_full A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
title_fullStr A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
title_full_unstemmed A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
title_sort review on malware variants detection techniques for threat intelligence in resource constrained devices: existing approaches, limitations and future direction
publisher Springer Science and Business Media Deutschland GmbH
publishDate 2023
_version_ 1806424178120720384