A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning

被引:15
作者
Zuhair, Hiba [1 ]
Selamat, Ali [2 ,3 ,4 ,5 ]
Krejcar, Ondrej [5 ]
机构
[1] Al Nahrain Univ, Dept Syst Engn, Coll Informat Engn, Baghdad 64074, Iraq
[2] Univ Teknol Malaysia UTM, Sch Comp, Fac Engn, UTM, Johor Baharu 81310, Johor, Malaysia
[3] Univ Teknol Malaysia UTM, Media & Games Ctr Excellence MagicX, Johor Baharu 81310, Johor, Malaysia
[4] Univ Teknol Malaysia, Malaysia Japan Int Inst Technol MJIIT, Jalan Sultan Yahya Petra, Kuala Lumpur 54100, Malaysia
[5] Univ Hradec Kralove, Ctr Basic & Appl Res, Fac Informat & Management, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 09期
关键词
crypto-ransomware; locker-ransomware; static analysis; dynamic analysis; machine learning; INTRUSION DETECTION; THREAT; CLASSIFICATION;
D O I
10.3390/app10093210
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Desktop and portable platform-based information systems become the most tempting target of crypto and locker ransomware attacks during the last decades. Hence, researchers have developed anti-ransomware tools to assist the Windows platform at thwarting ransomware attacks, protecting the information, preserving the users' privacy, and securing the inter-related information systems through the Internet. Furthermore, they utilized machine learning to devote useful anti-ransomware tools that detect sophisticated versions. However, such anti-ransomware tools remain sub-optimal in efficacy, partial to analyzing ransomware traits, inactive to learn significant and imbalanced data streams, limited to attributing the versions' ancestor families, and indecisive about fusing the multi-descent versions. In this paper, we propose a hybrid machine learner model, which is a multi-tiered streaming analytics model that classifies various ransomware versions of 14 families by learning 24 static and dynamic traits. The proposed model classifies ransomware versions to their ancestor families numerally and fuses those of multi-descent families statistically. Thus, it classifies ransomware versions among 40K corpora of ransomware, malware, and good-ware versions through both semi-realistic and realistic environments. The supremacy of this ransomware streaming analytics model among competitive anti-ransomware technologies is proven experimentally and justified critically with the average of 97% classification accuracy, 2.4% mistake rate, and 0.34% miss rate under comparative and realistic test.
引用
收藏
页数:23
相关论文
共 41 条
[1]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[2]  
Ahmadian MM, 2016, 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), P79, DOI 10.1109/ISCISC.2016.7736455
[3]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[4]  
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[5]  
[Anonymous], FREE ONL VIR MALW UR
[6]  
[Anonymous], 2016, INT J ADV RES COMPUT
[7]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[8]   Ransomware detection using machine learning algorithms [J].
Bae, Seong Il ;
Lee, Gyu Bin ;
Im, Eul Gyu .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
[9]  
Bhardwaj A., 2016, INDIAN J SCI TECHNOL, V9, P14, DOI [DOI 10.17485/ijst/2016/v9i19/90133, 10.17485/ijst/2016/v9i14/82936]
[10]   Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics [J].
Cabaj, Krzysztof ;
Gregorczyk, Marcin ;
Mazurczyk, Wojciech .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 :353-368