Review Article

Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review

Table 4

Summary of the metadata extracted from the literature on IoT-based malware detection.

Ref.Description: method and features used to train and evaluate modelDL algorithm usedLibrary/framework usedTargeted platformDataset
used
Accuracy/F1 score

[100]IoT and IoBT malware detection through op-code analysisCNNNot statedIoT, IoBTSelf-generated99.68%

[101]Behavior-based deep learning framework for detecting malware in IoT environmentSAEKerasIoTSelf-generatedAbout 98.6%

[102]Detecting pirated software and security threats in internet of things environmentCNNTensorFlow, KerasIoTNot stated96% for piracy detection, 97.46% for malware detection

[103]Malware detection in the Internet of things environment by decompiling and extracting op-codes from application samplesLSTMTensorFlow, Keras, scikit-learnIoTSelf-generated98.18%

[104]Attack detection in industrial Internet of things environmentDAE, DFFNNNot statedIoTNSL-KDD, UNSW-NB15Up to 98.6%

[105]Classification of malicious applications in the Internet of things environment by using graph embeddingCNNNot statedIoTSelf-generated88.5%

[106]Malware detection in industrial IoT devices by extracting DEX file and converting to java class file and extracting the bytecode from the class fileCNNTensorFlowIoTLeopard mobile dataset98.7%