ROBUST MALWARE DETECTION FOR INTERNET OF (BATTLEFIELD) THINGS
DEVICES USING DEEP EIGENSPACE LEARNING
A Dissertation submitted in partial fulfilment of the requirement for the award of degree of
MASTER OF COMPUTER APPLICATIONS
Of
Visvesvaraya Technological University
By
AJITH G
1MV19MCA52
Under the Guidance of
Internal Guide: External Guide:
Ms. Lakshmi K Ms. Namratha
Department of Master of Computer Applications,
Sir M. Visvesvaraya Institute of Technology
International Airport Road, Hunasamaranahalli, Yelahanka, Krishnadeveraya Nagar,
Bengaluru, Karnataka 562157
March 2021
ROBUST MALWARE DETECTION FOR INTERNET OF (BATTLEFIELD) THINGS
DEVICES USING DEEP EIGENSPACE LEARNING
A Dissertation submitted in partial fulfilment of the requirement for the award of degree of
MASTER OF COMPUTER APPLICATIONS
Of
Visvesvaraya Technological University
By
AJITH G
1MV19MCA52
Under the Guidance of
Internal Guide: External Guide:
Ms. Lakshmi K Ms. Namratha
Associate Professor, Dept. Of MCA, Software Developer,
Sir MVIT, Bengaluru-562157 Accent software,
[email protected] Bengaluru-560065
[email protected] Department of Master of Computer Applications,
Sir M. Visvesvaraya Institute of Technology
International Airport Road, Hunasamaranahalli, Yelahanka, Krishnadeveraya Nagar,
Bengaluru, Karnataka 562157
March 2021
Department of Master of Computer Applications,
Sir M. Visvesvaraya Institute of Technology
International Airport Road, Hunasamaranahalli, Yelahanka, Krishnadeveraya Nagar,
Bengaluru, Karnataka 562157
CERTIFICATE
This is to certify that AJITH G has completed his final semester project work entitled “ROBUST
MALWARE DETECTION FOR INTERNET OF (BATTLEFIELD) THINGS DEVICES
USING DEEP EIGENSPACE LEARNING” as a partial fulfilment for the award of Master of Computer
Application degree, during the academic year 2021 under our joint supervision.
Signature of Internal Guide Signature of External Guide
Ms. Lakshmi K Ms. Namratha
Associate Professor, Dept. Of MCA, Software Developer, Accent Software,
Sir MVIT, Bengaluru-562157 Bengaluru 560065
Signature of the HOD Signature of Principal
Dr. Manjula Sanjay Koti Dr. V.R Manjunath
Prof & HOD, Dept. Of MCA Principal, SMVIT
Sir MVIT, Bengaluru-562157 Sir MVIT, Bengaluru-562157
Declaration
I, AJITH G, student of 6th MCA, Sir M. Visvesvaraya Institute of Technology, bearing USN
1MV19MCA52 hereby declare that the project entitled ROBUST MALWARE DETECTION FOR
INTERNET OF (BATTLEFIELD) THINGS DEVICES USING DEEP EIGENSPACE
LEARNING has been carried out by me under the supervision of External Guide Ms. Namratha,
Software Developer and Internal Guide Ms. Lakshmi K, Associate Professor, Dept. Of MCA, and
submitted in partial fulfilment of the requirements for the award of the Degree of Master of Computer
Applications by the Visvesvaraya Technological University during the academic year 2021. This
report has not been submitted to any other Organization/University for any award of degree or
certificate.
Name: AJITH G
Signature:
ACKNOWLEDGMENT
I avail this opportunity to express my profound sense of sincere and deep gratitude to all those
who have contributed to the knowledge and experience that I have gained during my project work.
I express my heartfelt gratitude to Dr. V. R Manjunath, principal, Sir M. Visvesvaraya
Institute of Technology, Bengaluru, for providing me the opportunity to take up this project.
I also pay my regards to Dr. Manjula Sanjay koti, Prof. and HOD, Dept. of MCA, Sir M.
Visvesvaraya Institute of Technology, Bengaluru, for her inspiration, provision of facilities, and
encouragement.
To begin with, I am extremely thankful to my internal guide Ms. Lakshmi K, Associate
Professor, Dept. of MCA, Sir M. Visvesvaraya Institute of Technology, Bengaluru, for his valuable
guidance, cooperation and suggestions and his encouragement to complete the project.
I am extremely grateful to my external guide Ms. Namratha, Software Developer, Accent
software, Bengaluru, for permitting me to carry out this project work at the organization and their
support and guidance throughout the project.
Finally, I would like to thank my parents, department teaching and non-teaching staff and
friends for all their support and encouragement during my project work.
AJITH G
1MV19MCA52
ABSTRACT
Internet of Things (IoT) in military settings generally consists of a diverse range of
Internet-connected devices and nodes (e.g. medical devices and wearable combat uniforms). These IoT
devices and nodes are a valuable target for cyber criminals, particularly state-sponsored or nation state
actors. A common attack vector is the use of malware.
In this paper, we present a deep learning based method to detect Internet Of Battlefield Things
(IoBT) malware via the device’s Operational Code (OpCode) sequence. We transmute OpCodes into
a vector space and apply a deep Eigenspace learning approach to classify malicious and benign
applications. We also demonstrate the robustness of our proposed approach in malware detection and
its sustainability against junk code insertion attacks. Lastly, we make available our malware sample on
Github, which hopefully will benefit future research efforts (e.g. to facilitate evaluation of future
malware detection approaches).
A common attack vector is the use of malware. In this paper, we present a deep learning based
method to detect Internet Of Battlefield Things (IoBT) malware via the device‟s Operational Code
(OpCode) sequence. We transmute OpCodes into a vector space and apply a deep Eigenspace learning
approach to classify malicious and benign applications.
TABLE OF CONTENTS
1. INTRODUCTION………………………………………………….………….
1.1 Problem description………………………...……………….…………...
1.2 Company profile……..…………………………………………………..
2. LITERATURE SURVEY……………………………………………..............
2.1 Existing and Proposed system...…………………...…….…....................
2.2 Feasibility Study………………………..………………….….................
2.3 Tools and Technology used……………………………………………...
2.4 Hardware and Software requirements…………………………………...
3. SYSTEM REQUIREMENT SPECIFICATION………………………….
3.1 Functional Requirement…………………………………...…………….
3.2 Non – functional Requirements...……………………….…....................
4. SYSTEM DESIGN.……………………………….………………………….
4.1 System Perspective………………………………………...…………....
4.2 Context Diagram …..…………………………………….......................
5. DETAIL DESIGN…………….………………………………………...........
5.1 Use Case Diagram.…………………………………………...................
5.2 Sequence Diagram ……………...…………………………....................
5.3 Class Diagram …..………………………………………..…..................
5.4 Activity Diagram……………………………………….…….................
5.5 E-R Diagram……………………..…………………………...................
6. IMPLEMENTATION…………………………………………………...........
6.1 Screenshots ………………………………………………….................
6.2 Snippet Code…….…………………..………………………………......
7. SOFTWARE TESTING……………………………………………………...
8. CONCLUSION…………………………………………………….…............
9. FUTURE ENHANCEMENT…………………………………………............
10. REFERENCES………………………………………………………………..
LIST OF FIGURE