An Artificial Intelligence Driven Optimal Deep Belief Network Model for Malware Classification on IoT-Cloud Environment

Authors

  • Khalid Ammar Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, United Arab Emirates
  • Mohamad Khairi Ishak Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, United Arab Emirates
Volume: 16 | Issue: 1 | Pages: 30768-30773 | February 2026 | https://doi.org/10.48084/etasr.13929

Abstract

Computer-based systems, including mobile devices, desktops, Internet of Things (IoT), and Cyber-Physical Systems (CPS), are designed to protect data effectively. However, malware targets these systems, threatening data accessibility, integrity, and confidentiality through cyberattacks. This study proposes an Artificial Intelligence-driven Optimal Deep Belief Network for Malware Detection and Classification (AIODBN-MDC) approach, aiming to detect and classify malware in IoT-based cloud infrastructure. Initially, z-score normalization is performed to scale the data in a standard form. Then, a Bottleneck-Driven DBN (BDDBN) model is utilized to detect and classify the malware. Finally, the Enhanced Grasshopper Optimization Algorithm (EGOA) model is employed to fine-tune the hyperparameters of the BDDBN classifier. Experimental investigation of the proposed AIODBN-MDC technique on an Android malware dataset demonstrated an accuracy of 99.34%, outperforming existing methods.

Keywords:

malware detection, machine learning, Internet of Things (IoT), security, parameter adjustment, cloud computing

Downloads

Download data is not yet available.

References

M. Ahmed, N. Afreen, M. Ahmed, M. Sameer, and J. Ahamed, "An inception V3 approach for malware classification using machine learning and transfer learning," International Journal of Intelligent Networks, vol. 4, pp. 11–18, Jan. 2023. DOI: https://doi.org/10.1016/j.ijin.2022.11.005

A. Anand, S. Rani, D. Anand, H. M. Aljahdali, and D. Kerr, "An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications," Sensors, vol. 21, no. 19, Jan. 2021, Art. no. 6346. DOI: https://doi.org/10.3390/s21196346

S. M. Alshahrani et al., "IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with Deep Learning," Computers, Materials and Continua, vol. 74, no. 2, pp. 3085–3100, Oct. 2022. DOI: https://doi.org/10.32604/cmc.2023.032972

M. Shobana and S. Poonkuzhali, "A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes," in Service-Oriented Computing – ICSOC 2020 Workshops, Dubai, United Arab Emirates, 2021, pp. 534–548. DOI: https://doi.org/10.1007/978-3-030-76352-7_48

G. A. A. Mary, B. Sathyasri, K. Murali, L. A. J. Prabhu, and N. Bharatha Devi, "Electrocardiogram signal classification in an IoT environment using an adaptive deep neural networks," Neural Computing and Applications, vol. 35, no. 21, pp. 15333–15342, Jul. 2023. DOI: https://doi.org/10.1007/s00521-023-08534-9

S. M. T. Nizamudeen, "Intelligent intrusion detection framework for multi-clouds – IoT environment using swarm-based deep learning classifier," Journal of Cloud Computing, vol. 12, no. 1, Sep. 2023, Art. no. 134. DOI: https://doi.org/10.1186/s13677-023-00509-4

A. Al-Marghilani, "Comprehensive Analysis of IoT Malware Evasion Techniques," Engineering, Technology & Applied Science Research, vol. 11, no. 4, pp. 7495–7500, Aug. 2021. DOI: https://doi.org/10.48084/etasr.4296

X. Deng, B. Chen, X. Chen, X. Pei, S. Wan, and S. K. Goudos, "A Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT," IEEE Transactions on Industrial Informatics, vol. 20, no. 2, pp. 1445–1454, Oct. 2024. DOI: https://doi.org/10.1109/TII.2023.3245681

M. Jumaah, A. A. Yassin, Z. A. Abduljabbar, M. Jawad, V. O. Nyangaresi, and A. H. Ali, "Amalgamating Ensemble Machine Learning Soft Voting Classifier, SMOTE, and Pearson’s Correlation Coefficient for Enhanced Malware Detection," Engineering, Technology & Applied Science Research, vol. 15, no. 3, pp. 22746–22752, Jun. 2025. DOI: https://doi.org/10.48084/etasr.10420

R. Chaganti, V. Ravi, and T. D. Pham, "Deep learning based cross architecture internet of things malware detection and classification," Computers & Security, vol. 120, Sep. 2022, Art. no. 102779. DOI: https://doi.org/10.1016/j.cose.2022.102779

M. Al-Hawawreh, N. Moustafa, S. Garg, and M. S. Hossain, "Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks," IEEE Transactions on Network Science and Engineering, vol. 8, no. 4, pp. 2968–2981, Jul. 2021. DOI: https://doi.org/10.1109/TNSE.2020.3032415

P. Vijayalakshmi and D. Karthika, "Hybrid dual-channel convolution neural network (DCCNN) with spider monkey optimization (SMO) for cyber security threats detection in internet of things," Measurement: Sensors, vol. 27, Jun. 2023, Art. no. 100783. DOI: https://doi.org/10.1016/j.measen.2023.100783

M. Abdel-Basset, H. Hawash, K. M. Sallam, I. Elgendi, K. Munasinghe, and A. Jamalipour, "Efficient and Lightweight Convolutional Networks for IoT Malware Detection: A Federated Learning Approach," IEEE Internet of Things Journal, vol. 10, no. 8, pp. 7164–7173, Apr. 2023. DOI: https://doi.org/10.1109/JIOT.2022.3229005

N. Koroniotis, N. Moustafa, and E. Sitnikova, "A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework," Future Generation Computer Systems, vol. 110, pp. 91–106, Sep. 2020. DOI: https://doi.org/10.1016/j.future.2020.03.042

M. Abd Elaziz, M. A. A. Al-qaness, A. Dahou, R. A. Ibrahim, and A. A. A. El-Latif, "Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm," Advances in Engineering Software, vol. 176, Feb. 2023, Art. no. 103402. DOI: https://doi.org/10.1016/j.advengsoft.2022.103402

M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, "Deep recurrent neural network for IoT intrusion detection system," Simulation Modelling Practice and Theory, vol. 101, May 2020, Art. no. 102031. DOI: https://doi.org/10.1016/j.simpat.2019.102031

K. Kalaivani and M. Chinnadurai, "A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment," Intelligent Automation & Soft Computing, vol. 29, no. 3, pp. 1–15, 2021. DOI: https://doi.org/10.32604/iasc.2021.017515

M. Maray et al., "Optimal Bottleneck-Driven Deep Belief Network Enabled Malware Classification on IoT-Cloud Environment," Computers, Materials and Continua, vol. 74, no. 2, pp. 3101–3115, Oct. 2022. DOI: https://doi.org/10.32604/cmc.2023.032969

L. Wu, J. Wu, and T. Wang, "The improved grasshopper optimization algorithm with Cauchy mutation strategy and random weight operator for solving optimization problems," Evolutionary Intelligence, vol. 17, no. 3, pp. 1751–1781, Jun. 2024. DOI: https://doi.org/10.1007/s12065-023-00861-z

"Android Malware Dataset for Machine Learning." Kaggle, [Online]. Available: https://www.kaggle.com/datasets/shashwatwork/android-malware-dataset-for-machine-learning.

Downloads

How to Cite

[1]
K. Ammar and M. K. Ishak, “An Artificial Intelligence Driven Optimal Deep Belief Network Model for Malware Classification on IoT-Cloud Environment”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 30768–30773, Feb. 2026.

Metrics

Abstract Views: 110
PDF Downloads: 68

Metrics Information