A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning

被引:15
作者
Zuhair, Hiba [1 ]
Selamat, Ali [2 ,3 ,4 ,5 ]
Krejcar, Ondrej [5 ]
机构
[1] Al Nahrain Univ, Dept Syst Engn, Coll Informat Engn, Baghdad 64074, Iraq
[2] Univ Teknol Malaysia UTM, Sch Comp, Fac Engn, UTM, Johor Baharu 81310, Johor, Malaysia
[3] Univ Teknol Malaysia UTM, Media & Games Ctr Excellence MagicX, Johor Baharu 81310, Johor, Malaysia
[4] Univ Teknol Malaysia, Malaysia Japan Int Inst Technol MJIIT, Jalan Sultan Yahya Petra, Kuala Lumpur 54100, Malaysia
[5] Univ Hradec Kralove, Ctr Basic & Appl Res, Fac Informat & Management, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 09期
关键词
crypto-ransomware; locker-ransomware; static analysis; dynamic analysis; machine learning; INTRUSION DETECTION; THREAT; CLASSIFICATION;
D O I
10.3390/app10093210
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Desktop and portable platform-based information systems become the most tempting target of crypto and locker ransomware attacks during the last decades. Hence, researchers have developed anti-ransomware tools to assist the Windows platform at thwarting ransomware attacks, protecting the information, preserving the users' privacy, and securing the inter-related information systems through the Internet. Furthermore, they utilized machine learning to devote useful anti-ransomware tools that detect sophisticated versions. However, such anti-ransomware tools remain sub-optimal in efficacy, partial to analyzing ransomware traits, inactive to learn significant and imbalanced data streams, limited to attributing the versions' ancestor families, and indecisive about fusing the multi-descent versions. In this paper, we propose a hybrid machine learner model, which is a multi-tiered streaming analytics model that classifies various ransomware versions of 14 families by learning 24 static and dynamic traits. The proposed model classifies ransomware versions to their ancestor families numerally and fuses those of multi-descent families statistically. Thus, it classifies ransomware versions among 40K corpora of ransomware, malware, and good-ware versions through both semi-realistic and realistic environments. The supremacy of this ransomware streaming analytics model among competitive anti-ransomware technologies is proven experimentally and justified critically with the average of 97% classification accuracy, 2.4% mistake rate, and 0.34% miss rate under comparative and realistic test.
引用
收藏
页数:23
相关论文
共 41 条
[21]   Redemption: Real-Time Protection Against Ransomware at End-Hosts [J].
Kharraz, Amin ;
Kirda, Engin .
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 :98-119
[22]   Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm [J].
Kok, S. H. ;
Abdullah, Azween ;
Jhanjhi, N. Z. ;
Supramaniam, Mahadevan .
COMPUTERS, 2019, 8 (04)
[23]  
Kok SH, 2019, INT J COMPUT SCI NET, V19, P136
[24]   Ensemble learning for data stream analysis: A survey [J].
Krawczyk, Bartosz ;
Minku, Leandro L. ;
Gama, Joao ;
Stefanowski, Jerzy ;
Wozniak, Michal .
INFORMATION FUSION, 2017, 37 :132-156
[25]   Effects of data set features on the performances of classification algorithms [J].
Kwon, Ohbyung ;
Sim, Jae Mun .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (05) :1847-1857
[26]  
Lupu E.C., 2016, IEEE ACCESS
[27]   Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization [J].
Monika ;
Zavarsky, Pavol ;
Lindskog, Dale .
11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 :465-472
[28]   Ransomware early detection by the analysis of file sharing traffic [J].
Morato, Daniel ;
Berrueta, Eduardo ;
Magana, Eduardo ;
Izal, Mikel .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 124 :14-32
[29]  
Richardson R., 2017, INT MANAGEMENT REV, V13, P10
[30]  
Shabtai A., 2009, INFORM SECURITY TECH, V14, P16, DOI [10.1016/j.istr.2009.03.003, DOI 10.1016/j.istr.2009.03.003, DOI 10.1016/J.ISTR.2009.03.003]