Android Ransomware Attacks Detection with Optimized Ensemble Learning

被引:0
作者
Sifat, Shaharia [1 ]
Hossain, Md Sakir [1 ]
Tonny, Sadia Afrin [1 ]
Majumder, Bejoy [1 ]
Mahajabin, Riftana [1 ]
Shakhawat, Hossain Md [1 ]
机构
[1] Amer Int Univ Bangladesh, 408-1 Kuratoli Rd, Dhaka 1229, Bangladesh
来源
ADVANCES IN CYBERSECURITY, CYBERCRIMES, AND SMART EMERGING TECHNOLOGIES | 2023年 / 4卷
关键词
Ransomware; Android; Ensemble learning; CICAndMal2017; Hyperparameter tuning;
D O I
10.1007/978-3-031-21101-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is the most widely used operating system for mobile devices and is the most common target of various cyber attacks. Ransomware is one of the most common and dangerous malware attacks among of different types of attacks. In the last few years, a sharp escalation of the ransomware attack is observed. Traditional ransomware detection techniques fail to rein in the rise of the ransomware attack. Recently, machine learning is increasingly used in detecting cyberattacks. However, the detection of various types of ransomware is largely overlooked. Even the Android ransomware detection accuracy of the existing solutions are highly limited. In this paper, we propose a machine learning technique for detecting various types of Android ransomware from traffic analysis. The objective is to attain a higher detection rate. To this end, we exploit an ensemble machine learning technique with optimized hyperparameters. The hyperparameters of the Bagging ensemble learning are optimized using the grid search. Through simulations, the proposed machine learning models are found to achieve up to 11% higher detection accuracy than the state-of-the-art solution. The pletor ransomware can be detected with the highest accuracy (95.29%), while the average detection accuracy is the lowest (74.09%) for koler among all the types of Android ransomware.
引用
收藏
页码:41 / 53
页数:13
相关论文
共 22 条
  • [11] Jones J., 2017, IJISS, V6, P57
  • [12] MAPAS: a practical deep learning-based android malware detection system
    Kim, Jinsung
    Ban, Younghoon
    Ko, Eunbyeol
    Cho, Haehyun
    Yi, Jeong Hyun
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (04) : 725 - 738
  • [13] Lashkari AH, 2018, INT CARN CONF SECU, P242
  • [14] Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms
    Maigida A.M.
    Abdulhamid S.M.
    Olalere M.
    Alhassan J.K.
    Chiroma H.
    Dada E.G.
    [J]. Journal of Reliable Intelligent Environments, 2019, 5 (02) : 67 - 89
  • [15] An in-Depth Study of the Jisut Family of Android Ransomware
    Martin, Alejandro
    Hernandez-Castro, Julio
    Camacho, David
    [J]. IEEE ACCESS, 2018, 6 : 57205 - 57218
  • [16] Mim KR, 2021, P INT C 4 IND REVOLU
  • [17] Noorbehbahani Fakhroddin, 2020, Proceedings of the 10th International Conference on Computer and Knowledge Engineering (ICCKE 2020), P024, DOI 10.1109/ICCKE50421.2020.9303689
  • [18] Seni G., 2010, SYNTHESIS LECT DATA, V2, P1, DOI DOI 10.2200/S00240ED1V01Y200912DMK002
  • [19] Tirkey A, 2022, EDGE ANALYTICS, P489, DOI 10.1007/978-981-19-0019-8_37
  • [20] Tirkey A, 2022, EDGE ANALYTICS, P17, DOI 10.1007/978-981-19-0019-8_2