A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT

被引:25
作者
Ahmed, Yahye Abukar [1 ]
Huda, Shamsul [2 ]
Al-rimy, Bander Ali Saleh [3 ]
Alharbi, Nouf [4 ]
Saeed, Faisal [5 ]
Ghaleb, Fuad A. [3 ]
Ali, Ismail Mohamed [1 ]
机构
[1] SIMAD Univ, Fac Comp, Mogadishu 801, Somalia
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[3] Univ Teknol Malaysia UTM, Sch Comp, Fac Engn, Johor Baharu 81310, Malaysia
[4] Taibah Univ, Coll Comp Sci & Engn, POB 344, Al Madinah, Saudi Arabia
[5] Birmingham City Univ, DAAI Res Grp, Dept Comp & Data Sci, Sch Comp & Digital Technol, Birmingham B4 7XG, W Midlands, England
关键词
crypto-ransomware; Industrial Internet of Things; enhanced maximum Relevance and minimum Redundancy; TF-IDF; supervised approach; DYNAMIC-ANALYSIS; CYBER THREAT; SYSTEM; FEATURES; MODEL;
D O I
10.3390/su14031231
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Ransomware attacks against Industrial Internet of Things (IIoT) have catastrophic consequences not only to the targeted infrastructure, but also the services provided to the public. By encrypting the operational data, the ransomware attacks can disrupt the normal operations, which represents a serious problem for industrial systems. Ransomware employs several avoidance techniques, such as packing, obfuscation, noise insertion, irrelevant and redundant system call injection, to deceive the security measures and make both static and dynamic analysis more difficult. In this paper, a Weighted minimum Redundancy maximum Relevance (WmRmR) technique was proposed for better feature significance estimation in the data captured during the early stages of ransomware attacks. The technique combines an enhanced mRMR (EmRmR) with the Term Frequency-Inverse Document Frequency (TF-IDF) so that it can filter out the runtime noisy behavior based on the weights calculated by the TF-IDF. The proposed technique has the capability to assess whether a feature in the relevant set is important or not. It has low-dimensional complexity and a smaller number of evaluations compared to the original mRmR method. The TF-IDF was used to evaluate the weights of the features generated by the EmRmR algorithm. Then, an inclusive entropy-based refinement method was used to decrease the size of the extracted data by identifying the system calls with strong behavioral indication. After extensive experimentation, the proposed technique has shown to be effective for ransomware early detection with low-complexity and few false-positive rates. To evaluate the proposed technique, we compared it with existing behavioral detection methods.
引用
收藏
页数:15
相关论文
共 50 条
[1]  
Aboaoja Faitour A., 2021, 2021 International Conference on Data Science and Its Applications (ICoDSA), P181, DOI 10.1109/ICoDSA53588.2021.9617489
[2]  
Adamu A., 2022, Pedagog. Cult. Soc, V30, P225, DOI DOI 10.1080/14681366.2020.1794948
[3]  
Ahmadian MM, 2016, 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), P79, DOI 10.1109/ISCISC.2016.7736455
[4]   A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection [J].
Ahmed, Yahye Abukar ;
Kocer, Baris ;
Huda, Shamsul ;
Al-rimy, Bander Ali Saleh ;
Hassan, Mohammad Mehedi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167
[5]  
Ahmed YA, 2020, KSII T INTERNET INF, V14, P2236
[6]   Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT [J].
Al-Hawawreh, Muna ;
Sitnikova, Elena ;
Aboutorab, Neda .
IEEE ACCESS, 2021, 9 :148738-148755
[7]   Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :126-130
[8]   Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment [J].
Al-Hawawreh, Muna ;
Sitnikova, Elena .
2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2019,
[9]   Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
den Hartog, Frank ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :7137-7151
[10]   A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction [J].
Al-Rimy, Bander Ali Saleh ;
Maarof, Mohd Aiziani ;
Alazab, Mamoun ;
Alsolami, Fawaz ;
Shaid, Syed Zainudeen Mohd ;
Ghaleb, Fuad A. ;
Al-Hadhrami, Tawfik ;
Ali, Abdullah Marish .
IEEE ACCESS, 2020, 8 :140586-140598