@article {10.3844/jcssp.2020.1203.1211, article_type = {journal}, title = {Rule-Based Approach to Detect IoT Malicious Files}, author = {Alsattam, Faisal and Al-Akhras, Mousa and Almasri, Marwah M. and Alawairdhi, Mohammed}, volume = {16}, number = {9}, year = {2020}, month = {Oct}, pages = {1203-1211}, doi = {10.3844/jcssp.2020.1203.1211}, url = {https://thescipub.com/abstract/jcssp.2020.1203.1211}, abstract = {The current immersive increase of cyber-attacks requires constant evolution of the used security solutions. Current malware detection solutions are only able to identify known malwares that were previously detected. They also lack the ability to deeply investigate every file in the system. Therefore, new detection techniques are needed to fill this gab. In this study, a flexible and an effective rule-based approach is proposed to detect malicious files by searching for specific types of strings that should not exist in normal legitimate files. The proposed detection technique relies on the use of LOKI as a scanning agent that uses customized YARA rules with different complexities to search for the needed strings. The proposed methodology has been tested and it detected all malwares successfully.}, journal = {Journal of Computer Science}, publisher = {Science Publications} }