Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier

被引:28
作者
Zahoora, Umme [1 ]
Rajarajan, Muttukrishnan [2 ]
Pan, Zahoqing [3 ]
Khan, Asifullah [1 ,4 ,5 ]
机构
[1] Pakistan Inst Engn & Appl Sci, Dept Comp & Informat Sci, Islamabad 45650, Pakistan
[2] City Univ London, Sch Math Comp Sci & Engn, London EC1V 0HB, England
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[4] Pakistan Inst Engn & Appl Sci, Ctr Math Sci, Islamabad 45650, Pakistan
[5] Pakistan Inst Engn & Appl Sci, PIEAS Artificial Intelligence Ctr PAIC, Islamabad 45650, Pakistan
关键词
Zero-shot Learning; Zero-day Attack; Ransomware; Deep Learning; Autoencoder; Ensemble Classification;
D O I
10.1007/s10489-022-03244-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ransomware attacks are hazardous cyber-attacks that use cryptographic methods to hold victims' data until the ransom is paid. Zero-day ransomware attacks try to exploit new vulnerabilities and are considered a severe threat to existing security solutions and internet resources. In the case of zero-day attacks, training data is not available before the attack takes place. Therefore, we exploit Zero-shot Learning (ZSL) capabilities that can effectively deal with unseen classes compared to the traditional machine learning techniques. ZSL is a two-stage process comprising of: Attribute Learning (AL) and Inference Stage (IS). In this regard, this work presents a new Deep Contractive Autoencoder based Attribute Learning (DCAE-ZSL) technique as well as an IS method based on Heterogeneous Voting Ensemble (DCAE-ZSL-HVE). In the proposed DCAE-ZSL approach, Contractive Autoencoder (CAE) is employed to extract core features of known and unknown ransomware. The regularization term of CAE helps in penalizing the classifier's sensitivity against the small dissimilarities in the latent space. On the other hand, in case of the IS, four combination rules Global Majority (GM), Local Majority (LM), Cumulative Vote-against based Global Majority (CVAGM), Cumulative Vote-for based Global Majority (CVFGM) are utilized to find the final prediction. It is empirically shown that in comparison to conventional machine learning techniques, models trained on contractive embedding show reasonable performance against zero-day attacks. Furthermore, it is shown that the exploitation of these core features through the proposed voting based ensemble (DCAE-ZSL-HVE) has demonstrated significant improvement in detecting zero-day attacks (recall = 0.95) and reducing False Negative (FN = 6).
引用
收藏
页码:13941 / 13960
页数:20
相关论文
共 52 条
  • [1] Label-Embedding for Attribute-Based Classification
    Akata, Zeynep
    Perronnin, Florent
    Harchaoui, Zaid
    Schmid, Cordelia
    [J]. 2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2013, : 819 - 826
  • [2] Al-rimy B.A.S., 2018, A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework
  • [3] Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Shaid, Syed Zainudeen Mohd
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 476 - 491
  • [4] Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Prasetyo, Yuli Adam
    Shaid, Syed Zainudeen Mohd
    Ariffin, Aswami Fadillah Mohd
    [J]. INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2018, 10 (06): : 82 - 88
  • [5] Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Shaid, Syed Zainudeen Mohd
    [J]. COMPUTERS & SECURITY, 2018, 74 : 144 - 166
  • [6] Ransomware Detection System for Android Applications
    Alsoghyer, Samah
    Almomani, Iman
    [J]. ELECTRONICS, 2019, 8 (08)
  • [7] Andronio N, 2015, LECT NOTES COMPUTER
  • [8] Ashit D., 2016, INT J ADV COMPUT SC, DOI [10.14569/ijacsa.2016.070118, DOI 10.14569/IJACSA.2016.070118]
  • [9] A hybrid intrusion detection system design for computer network security
    Aydin, M. Ali
    Zaim, A. Halim
    Ceylan, K. Goekhan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 517 - 526
  • [10] Baldi P., 2012, P ICML WORKSHOP UNSU, P37