Particle Swarm Optimization: A Wrapper-Based Feature Selection Method for Ransomware Detection and Classification

被引:11
作者
Abbasi, Muhammad Shabbir [1 ,2 ]
Al-Sahaf, Harith [1 ]
Welch, Ian [1 ]
机构
[1] Victoria Univ Wellington, Sch Engn & Comp Sci, POB 600, Wellington 6140, New Zealand
[2] Univ Agr Faisalabad, Dept Comp Sci, Faisalabad, Punjab, Pakistan
来源
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2020 | 2020年 / 12104卷
关键词
Evolutionary computation; Ransomware detection; Feature selection;
D O I
10.1007/978-3-030-43722-0_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ransomware has emerged as a grave cyber threat. Many of the existing ransomware detection and classification models use datasets created through dynamic or behaviour analysis of ransomware, hence known as behaviour-based detection models. A big challenge in automated behaviour-based ransomware detection and classification is high dimensional data with numerous features distributed into various groups. Feature selection algorithms usually help to deal with high dimensionality for improving classification performance. In connection with ransomware detection and classification, the majority of the feature selection methods used in existing literature ignore the varying importance of various feature groups within ransomware behaviour analysis data set. For ransomware detection and classification, we propose a two-stage feature selection method that considers the varying importance of each of the feature groups in the dataset. The proposed method utilizes particle swarm optimization, a wrapper-based feature selection algorithm, for selection of the optimal number of features from each feature group to produce better classification performance. Although the proposed method shows comparable performance for binary classification, it performs significantly better for multi-class classification than existing feature selection method used for this purpose.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 36 条
[1]  
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[2]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[3]   Ransomware attacks: detection, prevention and cure [J].
Brewer R. .
1600, Elsevier Ltd (2016) :5-9
[4]   Malware classification using self organising feature maps and machine activity data [J].
Burnap, Pete ;
French, Richard ;
Turner, Frederick ;
Jones, Kevin .
COMPUTERS & SECURITY, 2018, 73 :399-410
[5]  
Cabaj Krzysztof, 2015, Przeglad Elektrotechniczny, V91, P201, DOI 10.15199/48.2015.11.48
[6]   Feature selection in machine learning: A new perspective [J].
Cai, Jie ;
Luo, Jiawei ;
Wang, Shulin ;
Yang, Sheng .
NEUROCOMPUTING, 2018, 300 :70-79
[7]   ShieldFS: A Self-healing, Ransomware-aware Filesystem [J].
Continella, Andrea ;
Guagnelli, Alessandro ;
Zingaro, Giovanni ;
De Pasquale, Giulio ;
Barenghi, Alessandro ;
Zanero, Stefano ;
Maggi, Federico .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :336-347
[8]  
Cover T.M., 1999, ELEMENTS INFORM THEO, DOI 10.1002/0471200611
[9]   Machine Learning-Based Detection of Ransomware Using SDN [J].
Cusack, Greg ;
Michel, Oliver ;
Keller, Eric .
PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18), 2018, :1-6
[10]  
Eberhart R, 2002, MHS 95 P 6 INT S MIC, P39, DOI [DOI 10.1109/MHS.1995.494215, 10.1109/mhs.1995.494215]