Prediction of android ransomware with deep learning model using hybrid cryptography

被引:4
作者
Kalphana, K. R. [1 ]
Aanjankumar, S. [2 ]
Surya, M. [3 ]
Ramadevi, M. S. [4 ]
Ramela, K. R. [5 ]
Anitha, T. [6 ]
Nagaprasad, N. [7 ]
Krishnaraj, Ramaswamy [8 ,9 ]
机构
[1] Mahendra Engn Coll, Dept Agr Engn, Namakkal 637503, Tamil Nadu, India
[2] VIT Bhopal Univ, Sch Comp Sci & Engn SCOPE, Bhopal Indore Highway, Sehore 466114, Madhya Pradesh, India
[3] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Vadapalani Campus, Chennai, India
[4] Mt Z Coll Engn & Technol, Dept Comp Sci & Engn, Pudukkottai, India
[5] Ultra Coll Engn & Technol, Dept Elect & Elect Engn, Madurai, India
[6] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai, India
[7] ULTRA Coll Engn & Technol, Dept Mech Engn, Madurai 625104, Tamil Nadu, India
[8] Dambi Dollo Univ, Coll Technol & Engn, Dept Mech Engn, Dembi Dolo, Ethiopia
[9] Saveetha Univ, Saveetha Inst Med & Tech Sci, Ctr Global Hlth Res, Chennai, India
关键词
Android; Ransomware; Deep learning; Squirrel search optimization; AlexNet; Hybrid cryptography; Blowfish; SECURITY; CLOUD; SCHEME;
D O I
10.1038/s41598-024-70544-x
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In recent times, the number of malware on Android mobile phones has been growing, and a new kind of malware is Android ransomware. This research aims to address the emerging concerns about Android ransomware in the mobile sector. Previous studies highlight that the number of new Android ransomware is increasing annually, which poses a huge threat to the privacy of mobile phone users for sensitive data. Various existing techniques are active to detect ransomware and secure the data in the mobile cloud. However, these approaches lack accuracy and detection performance with insecure storage. To resolve this and enhance the security level, the proposed model is presented. This manuscript provides both recognition algorithms based on the deep learning model and secured storage of detected data in the cloud with a secret key to safeguard sensitive user information using the hybrid cryptographic model. Initially, the input APK files and data are preprocessed to extract features. The collection of optimal features is carried out using the Squirrel search optimization process. After that, the Deep Learning-based model, adaptive deep saliency The AlexNet classifier is presented to detect and classify data as malicious or normal. The detected data, which is not malicious, is stored on a cloud server. For secured storage of data in the cloud, a hybrid cryptographic model such as hybrid homomorphic Elliptic Curve Cryptography and Blowfish is employed, which includes key computation and key generation processes. The cryptographic scheme includes encryption and decryption of data, after which the application response is found to attain a decrypted result upon user request. The performance is carried out for both the Deep Learning-based model and the hybrid cryptography-based security model, and the results obtained are 99.89% accuracy in detecting malware compared with traditional models. The effectiveness of the proposed system over other models such as GNN is 94.76%, CNN is 95.76%, and Random Forest is 96%.
引用
收藏
页数:19
相关论文
共 52 条
[1]  
Aanjankumar S, 2016, IEEE I C COMP INT CO, P652
[2]   Securing Mobile Edge Computing Using Hybrid Deep Learning Method [J].
Adeniyi, Olusola ;
Sadiq, Ali Safaa ;
Pillai, Prashant ;
Aljaidi, Mohammad ;
Kaiwartya, Omprakash .
COMPUTERS, 2024, 13 (01)
[3]  
Ahmad F. B., 2022, Securing cloud data: A machine learning based data categorization approach for cloud computing
[4]   Mitigating adversarial evasion attacks of ransomware using ensemble learning [J].
Ahmed, Usman ;
Lin, Jerry Chun-Wei ;
Srivastava, Gautam .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
[5]   Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data [J].
Almomani, Iman ;
Qaddoura, Raneeem ;
Habib, Maria ;
Alsoghyer, Samah ;
Al Khayer, Alaa ;
Aljarah, Ibrahim ;
Faris, Hossam .
IEEE ACCESS, 2021, 9 :57674-57691
[6]   A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-Centric IoMT Industry [J].
Alzubi, Jafar A. ;
Alzubi, Omar A. ;
Qiqieh, Issa ;
Singh, Ashish .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) :2049-2057
[7]   Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Alzubi, Tareq Mahmod ;
Singh, Ashish .
MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02) :795-807
[8]   Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Alazab, Moutaz ;
Alrabea, Adnan ;
Awajan, Albara ;
Qiqieh, Issa .
ELECTRONICS, 2022, 11 (19)
[9]   An efficient malware detection approach with feature weighting based on Harris Hawks optimization [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Al-Zoubi, Ala' M. ;
Hassonah, Mohammad A. ;
Kose, Utku .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2369-2387
[10]   Cryptosystem design based on Hermitian curves for IoT security [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Dorgham, Osama ;
Alsayyed, Mohammad .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (11) :8566-8589