Ransomware Attack Detection on the Internet of Things Using Machine Learning Algorithm

被引:1
作者
Zewdie, Temechu Girma [1 ]
Girma, Anteneh [1 ]
Cotae, Paul [1 ]
机构
[1] Univ Dist Columbia, Washington, DC 20008 USA
来源
HCI INTERNATIONAL 2022 - LATE BREAKING PAPERS: INTERACTING WITH EXTENDED REALITY AND ARTIFICIAL INTELLIGENCE | 2022年 / 13518卷
关键词
Malware; Ransomware; Random forest; Cyber-attacks; IoT security; Machine learning;
D O I
10.1007/978-3-031-21707-4_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, the Internet of things (IoT), which connect to larger, internet-connected devices, is exponentially increased, and is used across the globe [1]. Integration of such a device into networks to provide advanced and intelligent services has to Protect user privacy against cyber-attacks. Attackers exploit vulnerable end sensors and devices supporting IoT data transmission to gain unauthorized system privileges and access to information and connected resources. This paper investigates how malware attack, especially ransomware attack, exploits IoT devices. Moreover, we deeply review different Machine learning solutions that provide IoT security precisely on a ransomware attack. We focused on HowMachine learning solutions detect malicious incidents, such as a ransomware attack on IoT-connected networks. The authors perform all the experiments in this study using a benchmark dataset from the GitHub repository. We used Random Forest (RF) and Decision Tree (DT) Classifier algorithm to evaluate the performance comparison. Finally, we propose a machine learning detection model with better performance and accuracy.
引用
收藏
页码:598 / 613
页数:16
相关论文
共 34 条
[1]  
[Anonymous], 2022, World Economic Forum
[2]  
[Anonymous], 2017, ARTIFICIAL INTELLIGENCE AND SOUTHEAST ASIA'S FUTURE'
[3]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[4]   Ransomware: Recent advances, analysis, challenges and future research directions [J].
Beaman, Craig ;
Barkworth, Ashley ;
Akande, Toluwalope David ;
Hakak, Saqib ;
Khan, Muhammad Khurram .
COMPUTERS & SECURITY, 2021, 111
[5]  
Brownlee J., 2020, US
[6]  
Cohesity, 2021, ESS GUID MOD DAT MAN
[7]   Role of artificial intelligence in operations environment: a review and bibliometric analysis [J].
Dhamija, Pavitra ;
Bag, Surajit .
TQM JOURNAL, 2020, 32 (04) :869-896
[8]  
Dhingra M, 2016, 2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), P188, DOI 10.1109/PDGC.2016.7913142
[9]   Security information transmission algorithms for IoT based on cloud computing [J].
Ding Li ;
Wang Zhongsheng ;
Wang Xiaodong ;
Wu Dong .
COMPUTER COMMUNICATIONS, 2020, 155 :32-39
[10]  
Donostia G., 2019, P 20 INT C HUMAN COM