Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment

被引:17
|
作者
Alissa, Khalid A. [1 ]
Elkamchouchi, Dalia H. [2 ]
Tarmissi, Khaled [3 ]
Yafoz, Ayman [4 ]
Alsini, Raed [4 ]
Alghushairy, Omar [5 ]
Mohamed, Abdullah [6 ]
Al Duhayyim, Mesfer [7 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Networks & Commun Dept, SAUDI ARAMCO Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[3] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca 24382, Saudi Arabia
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 22254, Saudi Arabia
[5] Univ Jeddah, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah 21589, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11845, Egypt
[7] Prince Sattam Bin Abdulaziz Univ, Coll Sci & Humanities Aflaj, Dept Comp Sci, Al Kharj 16278, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 19期
关键词
cybersecurity; artificial intelligence; internet of things; ransomware attack; dwarf mongoose optimization;
D O I
10.3390/app12199513
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The internet of things (ransomware refers to a type of malware) is the concept of connecting devices and objects of all types on the internet. IoT cybersecurity is the task of protecting ecosystems and IoT gadgets from cyber threats. Currently, ransomware is a serious threat challenging the computing environment, which needs instant attention to avoid moral and financial blackmail. Thus, there comes a real need for a novel technique that can identify and stop this kind of attack. Several earlier detection techniques followed a dynamic analysis method including a complex process. However, this analysis takes a long period of time for processing and analysis, during which the malicious payload is often sent. This study presents a new model of dwarf mongoose optimization with machine-learning-driven ransomware detection (DWOML-RWD). The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the feature selection process is initially carried out using an enhanced krill herd optimization (EKHO) algorithm by the use of dynamic oppositional-based learning (QOBL). For ransomware detection, DWO with an extreme learning machine (ELM) classifier can be utilized. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset. The experimental results highlight the superiority of the DWOML-RWD model over other approaches.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Towards optimized machine-learning-driven intrusion detection for Internet of Things applications
    Alemerien K.
    Al-suhemat S.
    Almahadin M.
    International Journal of Information Technology, 2024, 16 (8) : 4981 - 4994
  • [2] Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment
    Aljabri, Jawhara
    Alzaben, Nada
    Nemri, Nadhem
    Alahmari, Saad
    Alotaibi, Shoayee Dlaim
    Alazwari, Sana
    Khadidos, Alaa O.
    Hilal, Anwer Mustafa
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 106 : 164 - 171
  • [3] Ransomware Attack Detection on the Internet of Things Using Machine Learning Algorithm
    Zewdie, Temechu Girma
    Girma, Anteneh
    Cotae, Paul
    HCI INTERNATIONAL 2022 - LATE BREAKING PAPERS: INTERACTING WITH EXTENDED REALITY AND ARTIFICIAL INTELLIGENCE, 2022, 13518 : 598 - 613
  • [4] Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment
    Al-Hawawreh, Muna
    Sitnikova, Elena
    2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2019,
  • [5] Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment
    Alohali M.A.
    Elsadig M.
    Al-Wesabi F.N.
    Al Duhayyim M.
    Hilal A.M.
    Motwakel A.
    Computer Systems Science and Engineering, 2023, 46 (03): : 3087 - 3102
  • [6] Pelican Optimization Algorithm with Federated Learning Driven Attack Detection model in Internet of Things environment
    Al-Wesabi, Fahd N.
    Mengash, Hanan Abdullah
    Marzouk, Radwa
    Alruwais, Nuha
    Allafi, Randa
    Alabdan, Rana
    Alharbi, Meshal
    Gupta, Deepak
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 148 : 118 - 127
  • [7] Fog-Based Ransomware Detection for Internet of Medical Things Using Lighweight Machine Learning Algorithms
    Harzie, Ras Elisa
    Selamat, Ali
    Fujita, Hamido
    Krejcar, Ondrej
    Hameed, Shilan
    Do, Nguyet Quang
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND APPLICATIONS, IEA-AIE 2024, 2024, 14748 : 200 - 211
  • [8] Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things
    Yueshen Xu
    Zhiying Wang
    Honghao Gao
    Zhiping Jiang
    Yuyu Yin
    Rui Li
    Digital Communications and Networks, 2023, 9 (01) : 138 - 145
  • [9] Machine Learning Driven Latency Optimization for Internet of Things Applications in Edge Computing
    Uchechukwu AWADA
    ZHANG Jiankang
    CHEN Sheng
    LI Shuangzhi
    YANG Shouyi
    ZTE Communications, 2023, 21 (02) : 40 - 52
  • [10] A Machine-Learning-Driven Sky Model
    Satilmis, Pinar
    Bashford-Rogers, Thomas
    Chalmers, Alan
    Debattista, Kurt
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2017, 37 (01) : 80 - 91