Enhancing cybersecurity against ransomware attacks using LSTM deep learning method: A case study on android devices

被引:0
|
作者
Karaca, Hatice [1 ]
Tekerek, Adem [1 ]
机构
[1] Gazi Univ, Technol Fac, Comp Engn Dept, Ankara, Turkiye
来源
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI | 2025年 / 28卷 / 02期
关键词
Android; Ransomware; Deep Learning; SYSTEM;
D O I
10.2339/politeknik.1508722
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid advancement of technology brings new threats to the digital world. One of these threats is malicious ransomware attacks. Ransomware is malicious software that demands ransom from innocent users by blocking access to information systems. Since traditional methods are limited to predefined blacklists, they may be ineffective against unknown ransomware types. On the other hand, deep learning methods offer a sensitive defense mechanism against anomalies by learning standard behavior patterns. This study studied the Internet logs of Android devices consisting of 392,034 rows and 86 columns using the Long Short-Term Memory (LSTM) model. The dataset contains 14 different Android ransomware families and harmless traffic. Data preprocessing steps include missing data management, outlier analysis, feature selection, coding operations, and data normalization/standardization. The dataset was split at 80% training 20% test ratio, and it was determined that the 80% training 20% test split had the highest accuracy. The developed LSTM-based classification model achieved successful results with a 99% accuracy rate and 0.99 F1 score.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Prediction of android ransomware with deep learning model using hybrid cryptography
    Kalphana, K. R.
    Aanjankumar, S.
    Surya, M.
    Ramadevi, M. S.
    Ramela, K. R.
    Anitha, T.
    Nagaprasad, N.
    Krishnaraj, Ramaswamy
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [2] A Review on Android Ransomware Detection Using Deep Learning Techniques
    Alzahrani, Nisreen
    Alghazzawi, Daniyal
    11TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES), 2019, : 330 - 335
  • [3] Deep learning techniques to detect cybersecurity attacks: a systematic mapping study
    Torre, Damiano
    Mesadieu, Frantzy
    Chennamaneni, Anitha
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (03)
  • [4] Deep learning techniques to detect cybersecurity attacks: a systematic mapping study
    Damiano Torre
    Frantzy Mesadieu
    Anitha Chennamaneni
    Empirical Software Engineering, 2023, 28
  • [5] Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives
    Bello, Ibrahim
    Chiroma, Haruna
    Abdullahi, Usman A.
    Gital, Abdulsalam Ya'u
    Jauro, Fatsuma
    Khan, Abdullah
    Okesola, Julius O.
    Abdulhamid, Shafi'i M.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8699 - 8717
  • [6] Deep Learning Defense Method Against Adversarial Attacks
    Wang, Ling
    Zhang, Cheng
    Liu, Jie
    2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 3667 - 3671
  • [7] A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques
    Fernando, Damien Warren
    Komninos, Nikos
    Chen, Thomas
    IOT, 2020, 1 (02): : 551 - 604
  • [8] A Comparative Study to Deep Learning for Pattern Recognition, By using Online and Batch Learning; Taking Cybersecurity as a case
    Djellali, Choukri
    Adda, Mehdi
    Moutacalli, Mohamed Tarik
    PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019), 2019, : 907 - 912
  • [9] DL-Droid: Deep learning based android malware detection using real devices
    Alzaylaee, Mohammed K.
    Yerima, Suleiman Y.
    Sezer, Sakir
    COMPUTERS & SECURITY, 2020, 89
  • [10] Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives
    Ibrahim Bello
    Haruna Chiroma
    Usman A. Abdullahi
    Abdulsalam Ya’u Gital
    Fatsuma Jauro
    Abdullah Khan
    Julius O. Okesola
    Shafi’i M. Abdulhamid
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 8699 - 8717