Pedio
Pedio
METODE PENELITIAN
LITERATUR REVIEW
Judul Hasil
Nama Metode yang
No Artike Link di Scimago Kekuran
Jurnal digunakan Kelebihan
l gan
[1] Analy Machine 95% dan 88% Kurang
sis of Learning, accuracy pada ditingkat
Interne https://www.scimagojr.com/
intern Image texture random forest kan
t of journalsearch.php?
et of feature. classifier dan K- akurasi
Things q=21100826426&tip=sid&clean=0
things nearest
malw neighbour
are
using
image
textur
e
featur
es and
machi
ne
learni
ng
techni
ques
[2] Simil Future https://www.scimagojr.com/ Clustering Recall Masih
arity Genera journalsearch.php? Malware, keseluruhan studi
hash tion q=12264&tip=sid&clean=0 Overview of 92%, akurasi tahap
based Comp the building sistem 91%, awal,
scorin uter blocks of the presisi 99%, kedepan
g of Syste proposed dan skor-F nya
portab ms method. 96%. mungkin
le Pendekatan akan ada
execu lebih fleksibel jurnal
table yang bisa
files meningk
for atkan
efficie kinerja
nt dari studi
malw sebelum
are nya.
detect
ion in
IoT.
[3] Malw IEEE https://www.scimagojr.com/ classifiers Analisis ini Kurangn
are Access journalsearch.php? use machine mencakup ya
Threa q=21100374601&tip=sid&clean=0 learning 2-3 literatur terbaru akurasi
ts and layer. tentang deteksi yang
Detec Zero-day. tinggi
tion Menggunakan sehingga
for fitur hibrid, Studi di
Indust karena fitur masa
rial hibrid dapat depan
Mobil menggambarka akan
e-IoT n perilaku melibatk
Netw aktual suatu an desain
orks aplikasi lebih dan
akurat daripada impleme
fitur statis atau ntasi
volume dinamis framewo
rk yang
akan
dapat
mendete
ksi
malware
dengan
akurasi
yang
lebih
tinggi
untuk
memasti
kan
deteksi
Zero-
day.
[4] Analy IEEE https://www.scimagojr.com/ Control Flow Menggunakan itur
zing Interne journalsearch.php? Graphs beberapa berbasis
and t of q=21100338350&tip=sid&clean=0 (CFGs) dari klasifikasi yang CFG
Detec Things sample berbeda dan diperliha
ting Journa malware mendapati tkan
Emer l yang berbeda akurasi yang dalam
ging dan Detesi tinggi, karya ini
Intern Algorithm mencapai 99% untuk
et of klasifikasi mendete
Thing menggunaka ksi
s n Logistic malware
Malw Regression, IoT
are: A Random dengan
Graph Forrest, dan akurasi
- CNN. tinggi,
Based fitur-fitur
Appro ini rentan
ach terhadap
kebingun
gan.
Sebagai
contoh,
kebingun
gan
fungsi-
level dari
malware
IoT
dapat
menyeba
bkan
peningka
tan
jumlah
kompone
n,
berkuran
gnya
aliran
kontrol
dan
berkuran
gnya
komplek
sitas,
yang
akan
memeng
aruhi
keakuraa
n sistem
deteksi.
[5] Fuzzy Journa https://www.scimagojr.com/ fuzzy pattern Akurasi fuzzy Kurang
patter l of journalsearch.php? tree, Racing pat- tern tree ditingkat
n tree Syste q=12398&tip=sid&clean=0 algorithm, and 90.093% kan
for ms Potential akurasi
edge Archit Heuristic. dari
malw ecture fuzzy
are patern
detect tree
ion karena
and akan
categ lebih
orizati efisien
on in untuk
IoT edge
komputi
ng di
jaringan
IOT.
[6] A Future Recurrent Akurasi Dataset
Deep Genera Neural tertinggi yang
https://www.scimagojr.com/
Recur tion Network, mencapai digunaka
rent Comp journalsearch.php? three (98.18%) n sangat
Neura uter q=12264&tip=sid&clean=0 different kecil
l Syste Long Short dibandin
Netw ms Term gkan
ork Memory dengan
Based (LSTM) cyberthre
Appro configuration ats yang
ach . ada di
for dunia
Intern nyata.
et of
Thing
s
Malw
are
Threa
t
Hunti
ng
[7] A IEEE https://www.scimagojr.com/ Efficient Dapat Kurang
secure Interne journalsearch.php? balance meningkatkan sempurn
IoT t of q=21100338350&tip=sid&clean=0 dynamics. efisiensi a dan
servic Things layanan sistem masih
e Journa IoT-Cloud dan penelitia
archit l memastikan n tahap
ecture kepercayaan awal.
data.
with
an
efficie
nt
balan
ce
dyna
mics
based
on
cloud
and
edge
comp
uting.
Daftar Pustaka
[1] E. M. Karanja, S. Masupe, and M. G. Jeffrey, “Analysis of internet of things malware using image
texture features and machine learning techniques,” Internet of Things, vol. 9, p. 100153, 2020, doi:
10.1016/j.iot.2019.100153.
[2] A. P. Namanya, I. U. Awan, J. P. Disso, and M. Younas, “Similarity hash based scoring of portable
executable files for efficient malware detection in IoT,” Futur. Gener. Comput. Syst., no. xxxx,
2019, doi: 10.1016/j.future.2019.04.044.
[3] S. Sharmeen, S. Huda, J. H. Abawajy, W. N. Ismail, and M. M. Hassan, “Malware Threats and
Detection for Industrial Mobile-IoT Networks,” IEEE Access, vol. 6, no. c, pp. 15941–15957,
2018, doi: 10.1109/ACCESS.2018.2815660.
[4] H. Alasmary et al., “Analyzing and Detecting Emerging Internet of Things Malware: A Graph-
Based Approach,” IEEE Internet Things J., vol. 6, no. 5, pp. 8977–8988, 2019, doi:
10.1109/JIOT.2019.2925929.
[5] E. Modiri, A. Azmoodeh, A. Dehghantanha, D. Ellis, R. M. Parizi, and H. Karimipour, “Fuzzy
pattern tree for edge malware detection and categorization in IoT,” J. Syst. Archit., vol. 97, no.
December 2018, pp. 1–7, 2019, doi: 10.1016/j.sysarc.2019.01.017.
[6] H. Haddadpajouh, A. Dehghantanha, R. Khayami, and K. R. Choo, “A Deep Recurrent Neural
Network Based Approach for Internet of Things Malware Threat Hunting,” Futur. Gener. Comput.
Syst., 2018, doi: 10.1016/j.future.2018.03.007.
[7] T. Wang, G. Zhang, A. Liu, M. Z. A. Bhuiyan, and Q. Jin, “A secure IoT service architecture with
an efficient balance dynamics based on cloud and edge computing,” IEEE Internet Things J., vol.
6, no. 3, pp. 4831–4843, 2019, doi: 10.1109/JIOT.2018.2870288.
[8] A. Ahmed, R. Latif, S. Latif, H. Abbas, and F. A. Khan, “Malicious insiders attack in IoT based
Multi-Cloud e-Healthcare environment: A Systematic Literature Review,” Multimed. Tools Appl.,
vol. 77, no. 17, pp. 21947–21965, 2018, doi: 10.1007/s11042-017-5540-x.
[9] W. Han, J. Xue, Y. Wang, Z. Liu, and Z. Kong, “MalInsight: A systematic profiling based malware
detection framework,” J. Netw. Comput. Appl., vol. 125, pp. 236–250, 2019, doi:
10.1016/j.jnca.2018.10.022.
[10] M. Singh et al., “Deep Learning based Blockchain Framework for,” vol. 3203, no. c, pp. 1–11,
2020, doi: 10.1109/TII.2020.2968946.
[11] C. I. Malware, “Efficient Signature Generation for Classifying,” 2018 IEEE Conf. Commun. Netw.
Secur., pp. 1–9, 2018.
[12] O. Novo, “Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT,” IEEE
Internet Things J., vol. 5, no. 2, pp. 1184–1195, 2018, doi: 10.1109/JIOT.2018.2812239.
[13] L. Zhou, L. Wang, Y. Sun, and P. Lv, “BeeKeeper: A Blockchain-Based IoT System with Secure
Storage and Homomorphic Computation,” IEEE Access, vol. 6, no. 8, pp. 43472–43488, 2018, doi:
10.1109/ACCESS.2018.2847632.