An Ensemble-based Supervised Machine Learning Framework for Android Ransomware Detection

被引:8
作者
Sharma, Shweta [1 ]
Challa, Rama Krishna [1 ]
Kumar, Rakesh [2 ]
机构
[1] Natl Inst Tech Teachers Training & Res Chandigarh, Dept Comp Sci & Engn, Chandigarh, India
[2] Cent Univ Haryana, Dept Comp Sci & Engn, Jant, Haryana, India
关键词
Smartphone security; android; ensemble learning; ransomware; dimensionality reduction;
D O I
10.34028/iajit/18/3A/5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With latest development in technology, the usage of smartphones to fulfill day-to-day requirements has been increased. The Android-based smartphones occupy the largest market share among other mobile operating systems. The hackers are continuously keeping an eye on Android-based smartphones by creating malicious apps housed with ransomware functionality for monetary purposes. Hackers lock the screen and/or encrypt the documents of the victim's Android based smartphones after performing ransomware attacks. Thus, in this paper, a framework has been proposed in which we (1) utilize novel features of Android ransomware, (2) reduce the dimensionality of the features, (3) employ an ensemble learning model to detect Android ransomware, and (4) perform a comparative analysis to calculate the computational time required by machine learning models to detect Android ransomware. Our proposed framework can efficiently detect both locker and crypto ransomware. The experimental results reveal that the proposed framework detects Android ransomware by achieving an accuracy of 99.67% with Random Forest ensemble model. After reducing the dimensionality of the features with principal component analysis technique; the Logistic Regression model took least time to execute on the Graphics Processing Unit (GPU) and Central Processing Unit (CPU) in 41 milliseconds and 50 milliseconds respectively.
引用
收藏
页码:422 / 429
页数:8
相关论文
共 27 条
[1]   Android Ransomware Detection Based on Dynamic Obtained Features [J].
Abdullah, Zubaile ;
Muhadi, Farah Waheeda ;
Saudi, Madihah Mohd ;
Hamid, Isredza Rahmi A. ;
Foozy, Cik Feresa Mohd .
RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING (SCDM 2020), 2020, 978 :121-129
[2]  
Abuthawabeh MKA, 2019, INT ARAB CONF INF TE, P42, DOI [10.1109/acit47987.2019.8991114, 10.1109/ACIT47987.2019.8991114]
[3]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[4]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[5]   Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance [J].
Arivudainambi, D. ;
Kumar, Varun K. A. ;
Chakkaravarthy, Sibi S. ;
Visu, P. .
COMPUTER COMMUNICATIONS, 2019, 147 :50-57
[6]   PERFORMANCE COMPARISON OF FPGA, GPU AND CPU IN IMAGE PROCESSING [J].
Asano, Shuichi ;
Maruyama, Tsutomu ;
Yamaguchi, Yoshiki .
FPL: 2009 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2009, :126-131
[7]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[8]   EC2: Ensemble Clustering and Classification for Predicting Android Malware Families [J].
Chakraborty, Tanmoy ;
Pierazzi, Fabio ;
Subrahmanian, V. S. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) :262-277
[9]   Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection [J].
Chen, Jing ;
Wang, Chiheng ;
Zhao, Ziming ;
Chen, Kai ;
Du, Ruiying ;
Ahn, Gail-Joon .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) :1286-1300
[10]   Android Security: A Survey of Issues, Malware Penetration, and Defenses [J].
Faruki, Parvez ;
Bharmal, Ammar ;
Laxmi, Vijay ;
Ganmoor, Vijay ;
Gaur, Manoj Singh ;
Conti, Mauro ;
Rajarajan, Muttukrishnan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02) :998-1022