In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework
Abstract
1. Introduction
Contributions
- Implementing a lightweight, resource-efficient on-device agent tailored for IoT limitations, focusing on critical low-level memory and process telemetry.
- Introducing adaptive entropy-based rarity scoring to detect suspicious memory regions without static thresholds accurately.
- Proposing a hybrid edge-fog-cloud scheme that intelligently offloads sophisticated computations to more advanced backend systems, enabling complex analysis without burdening edge devices.
- Lastly, pioneering the use of the Graph Neural Network (GNN) to analyze and model the semantic and causal relationships within system call functions (events), providing a comprehensive understanding of process behavior beyond traditional sequential patterns.
2. Background and Related Work
2.1. Techniques to Execute In-Memory Attacks
- Process Injection—Injecting code into another running application process’s memory space (e.g., using ptrace on Linux, VirtualAllocEx and WriteProcessMemory on Windows OS, IoT) [15].
- Reflective dynamic-link library (DLL) Loading—Loading a DLL directly into memory without it being present on disk.
- Memory Corruption Exploits—Vulnerabilities like buffer overflows can be abused to overwrite return addresses, redirecting execution flow to adversary-controlled shellcode injected into memory.
- Just-In-Time (JIT) Spraying: Injects scripts into a browser’s Just-In-Time (JIT) compiler, causing it to compile and execute damaging native code. While less common on limited IoT devices, it is a theoretical pathway for devices with rich web runtimes.
2.2. In-Memory Malware, Attack Vectors and Fileless Attack Detection
2.3. Limitations, Security Challenges of Malware Detection in IoT Networks
- Signature-based detection: A common technique, however, suffers from the same constraints as in traditional IT, failing against zero-day attacks or polymorphic threats, especially in-memory shellcode (variants). This security solution is based solely on comparing malicious hashes (of offsets in binaries) with those of a target file being scanned.
- Traditional Heuristics: Often too resource-intensive for continuous device monitoring. That may also be prone to false positive alerts.
- Full Memory Forensics: This approach necessitates significant RAM, CPU, and storage for memory analysis, rendering it incompatible for most IoT devices.
- Network-based intrusion detection systems (NIDS): This security layer monitors traffic for known attack patterns or anomalies in IoT networks (for example, Message Queuing Telemetry Transport (MQTT), Constrained Application Protocol (CoAP)) [24]. While valuable for discovering command and control (C2) communication or DDoS activities, NIDS cannot detect in-memory shellcode before network-level indicators manifest.
- Host-based intrusion detection systems (HIDSs): This measure usually focuses on process activity, lightweight monitoring of system logs, or basic network connections. Some other proposals used system call monitoring, analyzing sequences of calls to implant a baseline of normal behavior and identify deviations. However, as we previously mentioned, these functionalities often struggle with the complexity and stealth of in-memory shellcode, which can successfully mimic genuine activities (e.g., attackers can use the Hollowing process [25] for this purpose).
Challenges of IoT Security
- Resource Constraints: Limited CPU, battery, storage, and memory capacity make conventional heavy-duty security solutions inadequate.
- Heterogeneity: Various hardware architectures, such as ARM, MIPS, RISC-V, OS (Linux variants, RTOS, custom firmware), and communication protocols, complicate unified security layers.
- Obsoleteness and Lack of Standardization: Fragmented improvement and deployment models lead to inconsistent and obsolete security practices that are in use. That is, many IoT devices lack strong, or even any, over-the-air (OTA) update features, leaving them vulnerable to common exploits.
- Headless Operation: The absence of a user interface restricts direct user interaction for security notifications or configurations.
- Remote Management: Devices are often deployed in inaccessible or remote regions, making physical access for incident response challenging.
3. Proposed Framework: Lightweight Behavioral and Semantic Analysis
3.1. Lightweight On-Device Agent (Edge Layer)
Core Functions
- Process Memory Monitoring: The agent periodically scans specific memory locations (regions) and observes changes in memory (e.g., type of permissions).
- –
- Writable-Executable () Protection–Detection: Monitors for memory instances that are simultaneously writable and executable. Benign code usually resides in executable-only (EO) protection, while data resides in writable-only (WO) protection. A protection becoming (e.g., via mprotect on Linux) is a strong indicative factor of potential shellcode injection.
- –
- Entropy-based Anomaly Scoring (EAS): For newly apportioned or permission-altered executable memory regions, the agent calculates the value of the Shannon Entropy. Malicious shellcode often exhibits high Entropy (randomness), as previously mentioned Section 2.2, due to its compressed nature or its random behavior, unlike ordinary program code. We can calculate the Shannon entropy function for a sequence of bytes , which is defined as follows:The Anomaly Score, , is then derived from the computed entropy:Here, in this case, and are empirically defined entropy thresholds. Values between that range are scaled; values below score 0 (legitimate). Likewise, values above score 1 are highly suspicious. Novelty: We propose adaptive thresholds for EAS based on device-specific baseline entropy profiles. That is, instead of static , these can be mean and standard deviation derived from the normal behavior of devices, flagging regions where .
- System Call Hooking: The agent hooks critical system calls (e.g., read, write, mmap, socket, mprotect, execve, ptrace, connect, kill). It logs Syscall ID, Thread ID (TID), Process ID (PID), Timestamp, and Return Status, and chooses key arguments, for example, destination IP/port for connect, and memory address/permissions for mprotect.
- Control Flow Monitoring (Lightweight): For devices without hardware-assisted control flow integrity (CFI), the agent can track for unexpected control flow transfers to non-code memory locations within a process using simplified instruction monitoring or analyzing stack behavior.
Algorithm 1 Lightweight On-Device Agent Pseudocode |
|
3.2. Fog Layer/Network Gateway (Pre-Processing and Aggregation)
- Telemetry Aggregation (assemblage): Consolidates similar events from different devices.
- Initial Feature Engineering: May merge related events, for instance, a sequence of mmap and mprotect calls) into more advanced features.
- Lightweight Machine Learning Inference: Can host small, predefined ML models (e.g., a Logistic Regression classifier or a Decision Tree) to filter out frequent false positives or detect obvious suspicious patterns before transferring them to the cloud.
- Encrypted Communication: Ensures the safety and security of sensitive data in transit to the central (e.g., cloud) analytics platform.
3.3. Cloud-Based Semantic Analysis Engine (Backend Layer)
Key Innovations
- System Call Semantic Graph Analysis (SCSGA): This represents a core novel element. Instead of just invoking and evaluating sequences of system calls, we construct a “dynamic graph depiction of process behavior”.
- –
- Graph Structure: Each system call event, such as PID, Arguments, Syscall ID, Timestamp, becomes a node. Edges represent connections. Some of them are listed as follows:
- *
- Temporal Edge: This edge connects sequential “syscalls” within the same thread.
- *
- Memory Access Edge: This one links a syscall (e.g., read, write, mmap, mprotect) to the specified memory region it acts upon, thus modeled as a separate node.
- *
- Process/File Edge: This file edge links syscalls related to process creation, for example, “execve, fork” or file access such as “read, write” and “open”.
- *
- Inter-process Communication, also known as IPC Edge: It links syscalls related to sockets, pipes, and shared memory between processes.
- –
- Semantic Graph Representation: The graph nodes are enhanced with characteristics derived from the syscall arguments, for instance, memory protection flags, file descriptor, entropy score from edge layer, and network addresses.
- Graph Neural Network (GNN) for Anomaly (rarity) Detection: We address a customized GNN (Graph Convolutional Network (GCN), for example) or Graph Attention Network (GAT)) to learn robust, nonlinear patterns, structures within these behavioral graphs.Note: The decision of using the two-layer GCN instead of more complex models like temporal GNNs or attention-based graph models (e.g., StrGNN) is driven by a trade-off between model intricacy, computational effectiveness, and detection performance in a limited IoT environment. Several factors were considered for this decision, detailed as follows:
- –
- Reduced Computational Overhead: These complicated models (e.g., StrGNN) require significantly more computational resources for testing, inference, and training. In an IoT environment, where devices may have constrained memory, CPU, and battery life, a lightweight model is vital. A simple two-layer GCN is computationally less demanding, making it more feasible to run in a centralized cloud backend or on edge devices without causing excessive CPU usage or latency. This directly aligns to minimize CPU overhead.
- –
- Addressing the Specific Problem: The core issue is identifying rarities based on a device’s behavioral graph, for example, system calls and memory events. While temporal and attention-based models are powerful at capturing complex sequential dependencies, a static GCN model is often sufficient for this task. It learns to analyze and classify a snapshot of a device’s behavior as either normal or suspicious by leveraging the rapport between nodes (e.g., files, processes) and their characteristics within a single graph. The static (unchanging) nature of the GCN is a deliberate design choice that assumes the relevant malicious patterns can be detected from a single behavioral graph rather than from a long series of such graphs.
- –
- Directness and Interpretability: A simpler GCN model is less complicated to design. It facilitates smoother training and debugging. In the context of a security system, where false positive alerts can be critical, understanding why a model flagged an anomaly is significantly beneficial.
While more advanced models may provide slight improvements in accuracy, they often come at a high cost in terms of resource consumption and performance, which can be a prohibitive factor in real-world IoT deployments. The decision of using a simple GCN indicates a prioritization of practicality and efficiency (adaptability) over maximizing every last allotment point of detection rate.The following example is an update rule formulated for a single layer of a Graph Convolutional Network (GCN):- –
- : Input feature matrix for a layer, denoted as l. Each row corresponds to a node, i.e., a syscall event, and columns are its characteristics (features).
- –
- : Defines the output feature matrix for the layer .
- –
- : Adjacency matrix (square matrix) of the graph with supplementary self-loops () represents the identity matrix, allowing nodes to collect (aggregate) their features.
- –
- : Diagonal degree matrix of square matrix , where . The concept normalizes the square matrix, preventing features from disappearing during the gathering.
- –
- : This rule is a learnable weight matrix for the layer l. It transforms the collected features.
- –
- : This is a “Nonlinear activation function”. It introduces non-linearity to learn convoluted patterns.
This equation describes how node features are collected from their neighbors and transformed through a learnable linear alteration, followed by a non-linearity. The final layer of the GNN assigns an anomaly score to the complete graph or specific subgraphs, indicating the likelihood of malicious in-memory shellcode activity. This layer allows defenders to detect sophisticated, multi-stage attacks that might individually appear legitimate but form a malicious behavioral pattern when observed holistically across the system call graph.Novelty: For the “in-memory shellcode” detection, we are applying GNNs to model the “semantic relationships” and “causal dependencies” of system calls within a process’s lifecycle. That goes beyond simple N-gram examination by capturing more important contextual data and nonlinear cooperation, which is improved for sparse IoT telemetry. - Integration with Global Threat Intelligence: This step involves continuous updates/patches and fine-tunes the GNN models based on new shellcode variants and C2 infrastructures from global threat feeds.
- Forensic Analysis and Visualization: Provides tools for cybersecurity analysts and professionals to visualize the identified anomalous graphs, drill down into well-defined system call events, and start incident response procedures to isolate compromised devices, for example.
Algorithm 2 GNN-based Anomaly Detection—Cloud Backend |
|
▹//Detecting anomalies, rarities, invoke system calls. |
|
3.4. Methodology for Deriving the Threshold
- Maximizing a metric: Locating the threshold that yields the highest F1-score, which balances precision and true positive rate (recall).
- Balancing trade-offs: Choosing a point that achieves an acceptable trade-off between the detection rate (recall, TPR) and the rate of false alerts, which is paramount in a security system to avoid unnecessary alerts.
- Tuning to a particular false positive rate (FPR): Establishing the threshold to ensure the system does not exceed a predefined false positive rate.
3.5. Adversarial Testing
4. Experimental Setup and Evaluation
4.1. Testbed Environment
- IoT Devices: A heterogeneous aggregation of current IoT devices such as ESP32 (Xtensa), from manufacturer: Espressif Systems, City: Shanghai, Country: China. The raspberry Pi 4 (ARM) from manufacturer: Sony UK Technology Centre (under contract with the Raspberry Pi Foundation), City: Pencoed, Country: Wales, United Kingdom. An industrial controller (MIPS-based Linux). Those accessories usually ran custom Linux distributions, such as Buildroot/Yocto or FreeRTOS.
- Network Setup: We implement, configure, and use a restrained hands-on lab IoT network segment with isolated VLANs to be able to connect to a cloud backend for telemetry submission.
- Attack Toolkit: Kali Linux OS was used as the attacking machine. Shellcode generation tools, such as Metasploit Framework’s msfvenom and custom assembly code using objdump, were used. This last listed program is a command-line tool that exhibits various information about object files on Unix-like OS. We also used the nasm, a Netwide Assembler (NASM) and disassembler for the Intel ×86 architecture.Various abusive attempts were made to exploit vulnerabilities in those IoT devices. For example, Process injection through MQTT brokers, buffer overflows in obsolete web servers, and command injection were some of them. Different shellcode payloads (e.g., reverse shells, data exfiltration scripts, lightweight DDoS botnet agents, simple cryptominers) were launched, according to the target device’s architecture.
- Legitimate Workloads: We also consider performing benign device activity during our experiments to implement accurate baselines and evaluate false positive rates; for example, actuator control commands, secure shell (SSH) administration sessions, periodic sensor data logging (MQTT/HTTP), and routine firmware update checks.
4.2. Data Collection
4.3. Performance Metrics
- Detection Rate (True Positive Ratio—TPR): . Value FN defines false negative alerts.
- False Positive Ratio (FPR): (minimizing FPR is recommended for IoT devices to avoid disrupting vital operations).
- Precision: The precision, i.e., the exactness of detection, can be evaluated by the true positive alerts divided by the sum of true positive and false positive.
- Recall (equivalent to TPR):
- F1-Score: Generally F-score is a measure of predictive performance. It is computed from the precision and recall of the test, where precision is the numerical value of true positive alerts divided by the total number of cases predicted to be positive, including those not detected correctly. In brief, it is the harmonic mean of precision and recall.
- Latency Detection: Time taken from shellcode execution to be discovered at the cloud backend, which maintains the countermeasures.
- Resource Overhead on Device: This is closely related to the device power (CPU), network bandwidth, etc.
- –
- CPU Usage: The CPU work is evaluated as a percentage. It increases during various agent operations and on different devices.
- –
- Network Bandwidth: Average data transmitted by the agent, usually measured in megabytes per hour (MB/hour).
- –
- Memory Footprint: This is usually referred to Resident Set Size (RSS). It is the portion of memory (measured in KB) held by a process in the core memory (RAM) of the agent process.
4.4. Comparative Analysis
- Standard Heuristics: Simple rule-based detection technique. For example, a notification on any mprotect call modifying a page to , or an execve call originating from a dynamically apportioned memory region. Rule-based systems are a fast, simple, and effective method for known threats. They use predefined rules or signatures to identify threats. They can be powerful at detecting disclosed or simple attacks. However, their static nature makes them ill-suited for the dynamic landscape of IoT threats. They cannot detect zero-day attacks, which are crucial for IoT security. The rapid proliferation of new attack methods and IoT devices makes the rule’s set of updates impractical.
- Syscall N-gram Analysis: Conventional N-gram frequency analysis is used to detect anomalous sequences using a one-class SVM for outlier discovery Syscall n-gram SVM is an ML approach that models the behavior of an application program by observing sequences of system calls (syscalls). An SVM classifier is trained to differentiate between “normal” and “suspicious” syscall series. This technique is effective at detecting deviations from a program’s typical behavior, which can further indicate a shellcode injection.
- Adapted Enterprise Solutions: Due to resource limitations, a stripped-down version of an open-source EDR component was selected on higher-end IoT devices for a rudimentary comparison, (e.g., open-source OSQuery for process/memory snapshots, and the higher-end Raspberry Pi 4.)
- Convolutional Neural Networks: These CNNs are a type of deep learning model initially designed for video and image analysis. They excel at discovering spatial structures (patterns) and features. In the context of IoT network security, a CNN treats network traffic data (for example, a packet’s header and payload) as if it were a 1D image. It uses convolutional filters to automatically extract significant features, such as protocol anomalies and specific byte structures, that indicate suspicious behavior.
- Long Short-Term Memory Networks: This method is a specialized type of Recurrent Neural Network (RNN) designed to capture temporal dependencies and handle sequential data. They are handy for analyzing network traffic. An LSTM can remember past traffic patterns and use that memory to detect deviations that might trigger an attack. For example, it can learn from the regular sequential events in a device’s communication and trigger an alert when an unusual sequence of system calls occurs. Oftentimes, CNNs and LSTMs are merged in a hybrid model. While CNN extracts features from individual data points (e.g., a network packet), the LSTM observes the sequence of these features to identify multi-faceted attacks that unfold over time. The following well-known datasets are used to train and evaluate IDS. They were designed to address the shortcomings of existing datasets, which were often obsolete and did not accurately reflect real-world network traffic.
- –
- UNSW-NB15: This dataset was initiated in the Cyber Range Lab of the Australian Centre for Cyber Security. It consists of a mix of real, typical network activities and synthetically generated modern attacks, including Shellcode, Backdoors, Fuzzers, and Worms. It offers detailed network flow characteristics and is broadly used for research on IDS.
- –
- CIC-IDS2017: This component was initially developed by the Canadian Institute for Cybersecurity. It is then renowned for its realism, containing a week’s worth of network traffic with legitimate activities and contemporary known attacks, such as DoS, DDoS, Brute Force, and web application attacks. It includes several features, such as full packet payloads and flow characteristics extraction, making it an inclusive resource for evaluating IDSs.
4.5. Illustrative Graphs and Results
5. Novelty and Innovations
- IoT-Centric Lightweight Agent Model: Unlike other heavy endpoint detection and responses, our agent is purpose-built for extreme resource constraints. It primarily focuses on high-indicative factors, such as page detection, critical syscall monitoring, and adaptive entropy scoring with minimal calculation, ensuring device behavior (i.e., its functionalities) remains unimpeded. This selective telemetry gathering is also crucial for power-sensitive and CPU-limited devices.
- Adaptive Entropy-based Anomaly Scoring (EAS): We moved beyond static entropy thresholds by proposing the use of device-specific baseline entropy profiles. By dynamically adapting and (e.g., using ), we significantly decrease false positives while keeping up high sensitivity to anomalous code, which is critical for continuous monitoring in various IoT networks.
- Hybrid Edge-Fog-Cloud Architecture Optimization: The proposed three-tiered architecture (i.e., “Edge” for lightweight data aggregation, “Fog” for optional aggregation/pre-processing, and “Cloud” for deep semantic analysis) is accurately optimized to allocate computational load effectively. This scheme leverages the strengths of each layer, expanding detection scalability and capability while diminishing the impact on the most limited devices. Unlike some other works [33,34], which primarily focused on edge-based ML for detecting botnets in IoT environments, and on intrusion detection systems, our approach deals with in-memory attacks, i.e., attacks that were built specifically to circumvent security solutions (AV, IDS, EDR, etc.). Please see [35] for more information.
- System Call Semantic Graph Analysis with GNNs: This is an important innovation, as we transformed sequential system call events, raw, into semantic graphs that capture not only the temporal arrangement but also the causal dependencies and the contextual connections between calls and affected resources (i.e., memory regions, files, processes). The use of a customized GNN to evaluate these semantic graphs enables the detection of robust shellcodes (i.e., shellcodes designed to circumvent security measures) with a minimal false positive rate.
6. Discussion and Future Work
- Hardware-Assisted Features Integration: A thorough enumeration of integration with incipient hardware security features is necessary to improve integrity, agent resilience, and probably offload some monitoring tasks.
- Adversarial ML Robustness: We will deepen our study on GNN-based detection against adversarial attacks built to perturb benign system calls, aiming to evade detection. We will also consider the nature of this type of detection-based feature, as those products usually lack heuristic capability.
- Automated Feature Engineering for GNNs: We will expand our research to extract optimal features for the GNN from various IoT device telemetry, adapting to new attack structures and device architectures.
- Device Attestation and Secure Boot Integration: We will dive into the concept of tying in-memory shellcode detection with secure boot processes and remote attestation means to ensure the integrity and authenticity of the monitoring agent and the original firmware.
- Decentralized Inference at Scale: Sometimes, in this type of IoT network, there may be some ultra-low latency requirements with periodic cloud connectivity. Thus, we will need to explore techniques that, if addressed, will help push more advanced GNN inference down to higher-end IoT gateways and AI accelerators.
- Dynamic Baseline Adaptation: Developing more robust techniques for both on-device and cloud layers to dynamically adapt baselines to modifying firmware updates, device workloads, and environmental shifts. That will also help reduce false-positive alerts and manual maintenance.
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
GNN | Graph Neural Network |
SCSG | System Call Semantic Graph Analysis |
API | Application Programming Interface |
AV | Antivirus |
EDR | Endpoint Detection and Responses |
CI | Command Injection |
CPU | Central Processing Unit |
RAM | Random Access Memory |
AI | Artificial intelligence |
DL | Deep Learning |
ML | Machine Learning |
CNN | Convolutional Neural Networks |
SVM | Support Vector Machines |
NLP | Natural Language Processing |
TF-IDF | Term Frequency-Inverse Document Frequency matrices |
BOW | Bag of Words |
DLL | Dynamic-Link Library |
JIT | Just-In-Time |
IDS | Intrusion Detection System |
NIDS | Network-based Intrusion Detection Systems |
MQTT | Message Queuing Telemetry Transport |
CoAPP | Constrained Application Protocol |
HIDS | Host-based intrusion detection systems |
OTA | Over-The-Air |
WO, RO, EO | Writable, Readable, Executable-Only |
CFI | Control Flow Integrity |
SCSGA | System Call Semantic Graph Analysis |
IPC | Inter-process Communication |
GAT | Graph Attention Net-333 work |
GCN | Graph Convolutional Network |
C2 | Command and Control |
VLAN | Virtual Local Area Network |
NASM | Netwide Assembler |
DDoS | Distribution Denial of Services |
SSH | Secure Shell |
HTTP | Hypertext Transfer Protocol |
RSS | Resident Set Size |
KDE | Kernel Density Estimate |
AUC | Area Under the Curve |
References
- Almaleh, A.; Almushabb, R.; Ogran, R. Malware API calls detection using hybrid logistic regression and RNN model. Appl. Sci. 2023, 13, 5439. [Google Scholar] [CrossRef]
- Mehta, R.; Jurečková, O.; Stamp, M. A natural language processing approach to Malware classification. J. Comput. Virol. Hacking Tech. 2024, 20, 173–184. [Google Scholar] [CrossRef]
- Ullah, F.; Turab, A.; Ullah, S.; Cacciagrano, D.; Zhao, Y. Enhanced network intrusion detection system for internet of things security using multimodal big data representation with transfer learning and game theory. Sensors 2024, 24, 4152. [Google Scholar] [CrossRef] [PubMed]
- Ambekar, N.G.; Devi, N.N.; Thokchom, S.; Yogita. TabLSTMNet: Enhancing android malware classification through integrated attention and explainable AI. Microsyst. Technol. 2024, 31, 695–713. [Google Scholar] [CrossRef]
- Wengang, Z.; Hongrui, L.; Yumin, C.; Xuanming, D. Application of deep learning algorithms in geotechnical engineering: A short critical review. Artif. Intell. Rev. 2021, 54, 5633–5673. [Google Scholar] [CrossRef]
- Naskath, J.; Sivakamasundari, G.; Begum, A.A.S. A Study on Different Deep Learning Algorithms Used in Deep Neural Nets: MLP SOM and DBN. Wirel. Pers. Commun. 2022, 128, 2913–2936. [Google Scholar] [CrossRef] [PubMed]
- Chen, J.; Zhao, Z.; Cai, S.; Chen, X.; Ahmad, B.; Song, L.; Wang, K. DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree. Inf. Softw. Technol. 2024, 176, 107560. [Google Scholar] [CrossRef]
- Xin, Q.; He, Y.; Pan, Y.; Wang, Y.; Du, S. The implementation of an AI-driven advertising push system based on a NLP algorithm. Int. J. Glob. Econ. Manag. 2023, 1, 30–37. [Google Scholar] [CrossRef]
- Aboaoja, F.A.; Zainal, A.; Ghaleb, F.A.; Al-Rimy, B.A.S.; Eisa, T.A.E.; Elnour, A.A.H. Malware detection issues, challenges, and future directions: A survey. Appl. Sci. 2022, 12, 8482. [Google Scholar] [CrossRef]
- Dan, O.; Nadav, B.; Michal, L. The language of proteins: NLP, machine learning & protein sequences. ScienceDirect 2021, 19, 1750–1758. [Google Scholar] [CrossRef]
- Li, J.; He, J.; Li, W.; Fang, W.; Yang, G.; Li, T. SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Comput. Secur. 2024, 137, 103604. [Google Scholar] [CrossRef]
- Bachute, M.R.; Subhedar, J.M. Autonomous Driving Architectures: Insights of Machine Learning and Deep Learning Algorithms. ScienceDirect 2021, 6, 100164. [Google Scholar] [CrossRef]
- Abdel-Jaber, H.; Devassy, D.; Al Salam, A.; Hidaytallah, L.; El-Amir, M. A Review of Deep Learning Algorithms and Their Applications in Healthcare. Algorithms 2022, 15, 71. [Google Scholar] [CrossRef]
- Gao, C.; Huang, G.; Li, H.; Wu, B.; Wu, Y.; Yuan, W. A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments. In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, Lisbon, Portugal, 14–20 April 2024; Volume 19, pp. 1–13. [Google Scholar]
- Jean, R.D.; Ladislav, H. Process Injection and Migration Techniques: * Strategies to Bypass Security Software of Network Communication after a Successful Reverse shell. In Proceedings of the 2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI), Stará Lesná, Slovakia, 23–25 January 2025; Available online: https://ieeexplore.ieee.org/document/10883319 (accessed on 2 August 2025).
- Perdisci, P. Scalable Detection of Stealthy In-Memory Malware. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Orlando, FL, USA, 3–7 December 2012; Volume 19, pp. 211–220. [Google Scholar]
- Gu, B.; Bai, X.; Yang, Z.; Champion, A.C.; Xuan, D. Malicious Shellcode Detection with Virtual Memory Snapshots. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 3–7 December 2012. [Google Scholar]
- Shenfield, A.; Day, D.; Ayesh, A. Intelligent intrusion detection systems using artificial neural networks. ICT Express 2024, 4, 95–99. Available online: https://shura.shu.ac.uk/20882/10/Shenfield-IntelligentIntrusionDetection(VoR).pdf (accessed on 2 August 2025). [CrossRef]
- Gond, B.P.; Mohapatra, D.P. System Calls for Malware Detection and Classification: Methodologies and Applications. arXiv 2025, arXiv:2506.01412. Available online: https://arxiv.org/abs/2506.01412 (accessed on 2 August 2025). [CrossRef]
- ReliaQuest. Living Off the Land and Fileless Malware. 2024. Available online: https://reliaquest.com/blog/living-off-the-land-fileless-malware/ (accessed on 2 August 2025).
- Alfahaid, A.; Alalwany, E.; Almars, A.M.; Alharbi, F.; Atlam, E.; Mahgoub, I. Machine Learning-Based Security Solutions for IoT Networks: A Comprehensive Survey. Sensors 2025, 25, 3341. [Google Scholar] [CrossRef]
- Li, X.; Wang, X.; Shi, Z.; Zhang, R.; Xue, J.; Wang, Z. Boosting Training for PDF Malware Classifier via Active Learning. Appl. Sci. 2022, 37, 2803–2821. Available online: https://www.mdpi.com/2076-3417/15/14/7747 (accessed on 2 August 2025). [CrossRef]
- IBM. Addressing the Security Challenges of the Internet of Things. 2017. Available online: https://www.ibm.com/blogs/research/2017/02/iot-security/ (accessed on 2 August 2025).
- EMQX Team. MQTT vs CoAP: Comparing Protocols for IoT Connectivity. 2024. Available online: https://www.emqx.com/en/blog/mqtt-vs-coap (accessed on 2 August 2025).
- Jean, R.D.; Ladislav, H. Bypassing Network Activity Monitors using Process Hollowing. In Proceedings of the 25th Anniversary Edition International Conference on Control Systems and Computer Science, Bucharest, Romania, 30 June–3 July 2025; pp. 1–5. [Google Scholar]
- Jean, R.D.; Ladislav, H. Dangerousness of Client-side Code Execution with Microsoft Office. J. Comput. Inform. 2024, 43, 1219–1233. [Google Scholar] [CrossRef]
- Jean, R.D.; Ladislav, H. Advanced Techniques to Execute a Shellcode in Word Memory. In Proceedings of the 29th IEEE International Conference on Intelligent Engineering Systems 2025 (INES), Palermo, Italy, 11–13 June 2025. [Google Scholar] [CrossRef]
- Kipf, T.N.; Welling, M. Semi-supervised Classification with Graph Convolutional Networks. In Proceedings of the International Conference on Learning Representations (ICLR), Toulon, France, 24–26 April 2017. [Google Scholar] [CrossRef]
- Ma, C.; Li, Z.; Long, H.; Bilal, A.; Liu, X. A malware classification method based on directed API call relationships. PLoS ONE 2025, 20, e0299706. [Google Scholar] [CrossRef]
- Vrinda, M. Graph Neural Networks for Malware Classification. Master’s Thesis, San Jose State University, San Jose, CA, USA, 2022. [Google Scholar] [CrossRef]
- Sun, P.; Wan, Y.; Wu, Z.; Fang, Z. A survey on security issues in IoT operating systems. J. Netw. Comput. Appl. 2024, 231, 103976. [Google Scholar] [CrossRef]
- Alvi, J. A Survey of the Security Challenges and Requirements for IoT Operating Systems. arXiv 2023, arXiv:2310.19825. Available online: https://arxiv.org/pdf/2310.19825 (accessed on 2 August 2025). [CrossRef]
- Anchitaalagammai, J.V.; Kavitha, S.; Murali, S. Edge-Based Machine Learning for Immediate Botnet Detection and Response in IoT Networks. In Proceedings of the International Conference on Sustainable Communication Networks and Application (ICSCNA), Theni, India, 11–13 December 2024. [Google Scholar] [CrossRef]
- Altaf, T. Towards an Efficient Network Intrusion Detection System for IoT Networks Leveraging Graph Neural Networks. 2024. Available online: https://opus.lib.uts.edu.au/bitstream/10453/179570/1/thesis.pdf (accessed on 2 August 2025).
- Zhang, S.; Tong, X.; Chi, K.; Gao, W.; Chen, X.; Shi, Z. Stackelberg Game-Based Multi-Agent Algorithm for Resource Allocation and Task Offloading in MEC-Enabled C-ITS. IEEE Trans. Intell. Transp. Syst. 2025. [Google Scholar] [CrossRef]
Agent | Average CPU USAGE (%) | Standard Deviation (CPU) | Average Detection Rate (%) | Standard Deviation Detection |
---|---|---|---|---|
Proposed agent | 1.5 | 0.25 | 84 | 1.5 |
2 | 0.27 | 89 | 1.42 | |
2.5 | 0.24 | 92 | 1.39 | |
3 | 0.31 | 94 | 1.59 | |
Baseline agent | 4 | 0.22 | 72 | 1.55 |
4.5 | 0.36 | 77 | 1.61 | |
5 | 0.32 | 82 | 1.48 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dora, J.R.; Hluchý, L.; Staňo, M. In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework. Sensors 2025, 25, 5425. https://doi.org/10.3390/s25175425
Dora JR, Hluchý L, Staňo M. In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework. Sensors. 2025; 25(17):5425. https://doi.org/10.3390/s25175425
Chicago/Turabian StyleDora, Jean Rosemond, Ladislav Hluchý, and Michal Staňo. 2025. "In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework" Sensors 25, no. 17: 5425. https://doi.org/10.3390/s25175425
APA StyleDora, J. R., Hluchý, L., & Staňo, M. (2025). In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework. Sensors, 25(17), 5425. https://doi.org/10.3390/s25175425