Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment

被引:21
作者
Alissa, Khalid A. [1 ]
Elkamchouchi, Dalia H. [2 ]
Tarmissi, Khaled [3 ]
Yafoz, Ayman [4 ]
Alsini, Raed [4 ]
Alghushairy, Omar [5 ]
Mohamed, Abdullah [6 ]
Al Duhayyim, Mesfer [7 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Networks & Commun Dept, SAUDI ARAMCO Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[3] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca 24382, Saudi Arabia
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 22254, Saudi Arabia
[5] Univ Jeddah, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah 21589, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11845, Egypt
[7] Prince Sattam Bin Abdulaziz Univ, Coll Sci & Humanities Aflaj, Dept Comp Sci, Al Kharj 16278, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 19期
关键词
cybersecurity; artificial intelligence; internet of things; ransomware attack; dwarf mongoose optimization;
D O I
10.3390/app12199513
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The internet of things (ransomware refers to a type of malware) is the concept of connecting devices and objects of all types on the internet. IoT cybersecurity is the task of protecting ecosystems and IoT gadgets from cyber threats. Currently, ransomware is a serious threat challenging the computing environment, which needs instant attention to avoid moral and financial blackmail. Thus, there comes a real need for a novel technique that can identify and stop this kind of attack. Several earlier detection techniques followed a dynamic analysis method including a complex process. However, this analysis takes a long period of time for processing and analysis, during which the malicious payload is often sent. This study presents a new model of dwarf mongoose optimization with machine-learning-driven ransomware detection (DWOML-RWD). The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the feature selection process is initially carried out using an enhanced krill herd optimization (EKHO) algorithm by the use of dynamic oppositional-based learning (QOBL). For ransomware detection, DWO with an extreme learning machine (ELM) classifier can be utilized. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset. The experimental results highlight the superiority of the DWOML-RWD model over other approaches.
引用
收藏
页数:16
相关论文
共 22 条
[1]   Dwarf Mongoose Optimization Algorithm [J].
Agushaka, Jeffrey O. ;
Ezugwu, Absalom E. ;
Abualigah, Laith .
COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 2022, 391
[2]   A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT [J].
Ahmed, Yahye Abukar ;
Huda, Shamsul ;
Al-rimy, Bander Ali Saleh ;
Alharbi, Nouf ;
Saeed, Faisal ;
Ghaleb, Fuad A. ;
Ali, Ismail Mohamed .
SUSTAINABILITY, 2022, 14 (03)
[3]   Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :126-130
[4]   Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment [J].
Al-Hawawreh, Muna ;
Sitnikova, Elena .
2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2019,
[5]   A Review on Android Ransomware Detection Using Deep Learning Techniques [J].
Alzahrani, Nisreen ;
Alghazzawi, Daniyal .
11TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES), 2019, :330-335
[6]  
Ashraf A, 2020, Arxiv, DOI arXiv:1910.00286
[7]   BigRC-EML: big-data based ransomware classification using ensemble machine learning [J].
Aurangzeb, Sana ;
Anwar, Haris ;
Naeem, Muhammad Asif ;
Aleem, Muhammad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05) :3405-3422
[8]  
Basnet Manoj, 2021, 2021 IEEE PES Innovative Smart Grid Technologies Conference - Latin America (ISGT Latin America), DOI 10.1109/ISGTLatinAmerica52371.2021.9543031
[9]   Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives [J].
Bello, Ibrahim ;
Chiroma, Haruna ;
Abdullahi, Usman A. ;
Gital, Abdulsalam Ya'u ;
Jauro, Fatsuma ;
Khan, Abdullah ;
Okesola, Julius O. ;
Abdulhamid, Shafi'i M. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) :8699-8717
[10]   Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data Protection [J].
Du, Jian ;
Raza, Sajid Hussain ;
Ahmad, Mudassar ;
Alam, Iqbal ;
Dar, Saadat Hanif ;
Habib, Muhammad Asif .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022