Mitigating adversarial evasion attacks of ransomware using ensemble learning

被引:29
作者
Ahmed, Usman [1 ]
Lin, Jerry Chun-Wei [1 ]
Srivastava, Gautam [2 ,3 ]
机构
[1] Western Norway Univ Appl Sci, Dept Comp Sci Elect Engn & Math Sci, N-5063 Bergen, Norway
[2] Brandon Univ, Dept Math & Comp Sci, Brandon, MB, Canada
[3] China Med Univ, Res Ctr Interneural Comp, Taichung, Taiwan
关键词
Android ransomware; Adversarial evasion attacks; Machine learning-based ensemble analysis; Attack mitigation; Ransomware detection; MALWARE CLASSIFICATION;
D O I
10.1016/j.compeleceng.2022.107903
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware continues to pose a significant threat to cybersecurity by extorting money from users by locking their devices and personal data. The attackers force the payment of a ransom in order to restore access to personal files. Because of the structural similarity, detection of ransomware and benign applications becomes vulnerable to evasion attacks. Ensemble learning can provide countermeasures, while attackers can use the same technique to improve the effectiveness of their respective attacks. This motivates us to investigate whether the distinct ensemble method can achieve better performance when combined with the votingbased method. This research proposes a hybrid approach that examines permissions, text, and network-based features both statically and dynamically by monitoring memory usage, system call logs, and CPU usage. Ensemble machine learning analyzers on static and dynamic features extracted from Android malware applications (ransomware and non-ransomware) are then trained in the designed model. Our experimental results show that the proposed ensemble classification and detection technique can classify unknown static and dynamic ransomware behavior to mitigate adversarial evasion attacks.
引用
收藏
页数:14
相关论文
共 25 条
  • [1] A load balance multi-scheduling model for OpenCL kernel tasks in an integrated cluster
    Ahmed, Usman
    Lin, Jerry Chun-Wei
    Srivastava, Gautam
    Aleem, Muhammad
    [J]. SOFT COMPUTING, 2021, 25 (01) : 407 - 420
  • [2] Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Shaid, Syed Zainudeen Mohd
    [J]. COMPUTERS & SECURITY, 2018, 74 : 144 - 166
  • [3] Alzahrani A, 2018, INT CONF ELECTRO INF, P892, DOI 10.1109/EIT.2018.8500161
  • [4] Ameer M, 2018, J INF ASSUR SECUR, V13, P109
  • [5] Aminordin A, 2018, J THEOR APPL INF TEC, V96
  • [6] Aurangzeb S., 2018, MACHINE LEARNING BAS
  • [7] Multinomial malware classification via low-level features
    Banin, Sergii
    Dyrkolbotn, Geir Olav
    [J]. DIGITAL INVESTIGATION, 2018, 26 : S107 - S117
  • [8] Wild patterns: Ten years after the rise of adversarial machine learning
    Biggio, Battista
    Roli, Fabio
    [J]. PATTERN RECOGNITION, 2018, 84 : 317 - 331
  • [9] Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection
    Chen, Jing
    Wang, Chiheng
    Zhao, Ziming
    Chen, Kai
    Du, Ruiying
    Ahn, Gail-Joon
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1286 - 1300
  • [10] Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection
    Ferrante, Alberto
    Malek, Miroslaw
    Martinelli, Fabio
    Mercaldo, Francesco
    Milosevic, Jelena
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 : 242 - 258