Enhancing cybersecurity against ransomware attacks using LSTM deep learning method: A case study on android devices

被引:0
|
作者
Karaca, Hatice [1 ]
Tekerek, Adem [1 ]
机构
[1] Gazi Univ, Technol Fac, Comp Engn Dept, Ankara, Turkiye
来源
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI | 2024年
关键词
Android; Ransomware; Deep Learning; SYSTEM;
D O I
10.2339/politeknik.1508722
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid advancement of technology brings new threats to the digital world. One of these threats is malicious ransomware attacks. Ransomware is malicious software that demands ransom from innocent users by blocking access to information systems. Since traditional methods are limited to predefined blacklists, they may be ineffective against unknown ransomware types. On the other hand, deep learning methods offer a sensitive defense mechanism against anomalies by learning standard behavior patterns. This study studied the Internet logs of Android devices consisting of 392,034 rows and 86 columns using the Long Short-Term Memory (LSTM) model. The dataset contains 14 different Android ransomware families and harmless traffic. Data preprocessing steps include missing data management, outlier analysis, feature selection, coding operations, and data normalization/standardization. The dataset was split at 80% training 20% test ratio, and it was determined that the 80% training 20% test split had the highest accuracy. The developed LSTM-based classification model achieved successful results with a 99% accuracy rate and 0.99 F1 score.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] End-to-end malware detection for android IoT devices using deep learning
    Ren, Zhongru
    Wu, Haomin
    Ning, Qian
    Hussain, Iftikhar
    Chen, Bingcai
    AD HOC NETWORKS, 2020, 101
  • [22] A Two-Layer Deep Learning Method for Android Malware Detection Using Network Traffic
    Feng, Jiayin
    Shen, Limin
    Chen, Zhen
    Wang, Yuying
    Li, Hui
    IEEE ACCESS, 2020, 8 : 125786 - 125796
  • [23] Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches
    Sharmeen, Shaila
    Ahmed, Yahye Abukar
    Huda, Shamsul
    Kocer, Bari S.
    Hassan, Mohammad Mehedi
    IEEE ACCESS, 2020, 8 : 24522 - 24534
  • [24] Preserving Location Privacy in the IoT against Advanced Attacks using Deep Learning
    Alyousef, Abdullah S.
    Srinivasan, Karthik
    Alrahhal, Mohamad Shady
    Alshammari, Majdah
    Al-Akhras, Mousa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 416 - 427
  • [25] Enhancing the Sustainability of Deep-Learning-Based Network Intrusion Detection Classifiers against Adversarial Attacks
    Alotaibi, Afnan
    Rassam, Murad A.
    SUSTAINABILITY, 2023, 15 (12)
  • [26] Enhancing cybersecurity in higher education institutions using optimal deep learning-based biometric verification
    Ragab, Mahmoud
    Alghamdi, Bandar M.
    Alakhtar, Rayed
    Alsobhi, Huda
    Maghrabi, Louai A.
    Alghamdi, Ghadah
    Nooh, Sameer
    AL-Ghamdi, Abdullah AL-Malaise
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 117 : 340 - 351
  • [27] Deep Learning of Sensor Data in Cybersecurity of Robotic Systems: Overview and Case Study Results
    Szynkiewicz, Wojciech
    Niewiadomska-Szynkiewicz, Ewa
    Lis, Kamila
    ELECTRONICS, 2023, 12 (19)
  • [28] ENHANCING CYBERSECURITY VIA ANOMALY RECOGNITION USING THERMAL EXCHANGE FRACTALS OPTIMIZATION WITH DEEP LEARNING ON IOT NETWORKS
    Alhashmi, Asma a.
    Alamro, Hayam
    Aljebreen, Mohammed
    Alghamdi, Mohammed
    Alharbi, Abeer a. k.
    Mahmud, Ahmed
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2025,
  • [29] A Network Intrusion Detection System using Deep Learning against MQTT Attacks in IoT
    Mosaiyebzadeh, Fatemeh
    Araujo Rodriguez, Luis Gustavo
    Batista, Daniel Macedo
    Hirata Jr, R.
    2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021), 2021,
  • [30] A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN
    Zhang, Ming
    Xu, Boyi
    Bai, Shuai
    Lu, Shuaibing
    Lin, Zhechao
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 828 - 836