Mitigating adversarial evasion attacks of ransomware using ensemble learning

被引:32
作者
Ahmed, Usman [1 ]
Lin, Jerry Chun-Wei [1 ]
Srivastava, Gautam [2 ,3 ]
机构
[1] Western Norway Univ Appl Sci, Dept Comp Sci Elect Engn & Math Sci, N-5063 Bergen, Norway
[2] Brandon Univ, Dept Math & Comp Sci, Brandon, MB, Canada
[3] China Med Univ, Res Ctr Interneural Comp, Taichung, Taiwan
关键词
Android ransomware; Adversarial evasion attacks; Machine learning-based ensemble analysis; Attack mitigation; Ransomware detection; MALWARE CLASSIFICATION;
D O I
10.1016/j.compeleceng.2022.107903
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware continues to pose a significant threat to cybersecurity by extorting money from users by locking their devices and personal data. The attackers force the payment of a ransom in order to restore access to personal files. Because of the structural similarity, detection of ransomware and benign applications becomes vulnerable to evasion attacks. Ensemble learning can provide countermeasures, while attackers can use the same technique to improve the effectiveness of their respective attacks. This motivates us to investigate whether the distinct ensemble method can achieve better performance when combined with the votingbased method. This research proposes a hybrid approach that examines permissions, text, and network-based features both statically and dynamically by monitoring memory usage, system call logs, and CPU usage. Ensemble machine learning analyzers on static and dynamic features extracted from Android malware applications (ransomware and non-ransomware) are then trained in the designed model. Our experimental results show that the proposed ensemble classification and detection technique can classify unknown static and dynamic ransomware behavior to mitigate adversarial evasion attacks.
引用
收藏
页数:14
相关论文
共 25 条
[1]   A load balance multi-scheduling model for OpenCL kernel tasks in an integrated cluster [J].
Ahmed, Usman ;
Lin, Jerry Chun-Wei ;
Srivastava, Gautam ;
Aleem, Muhammad .
SOFT COMPUTING, 2021, 25 (01) :407-420
[2]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[3]  
Alzahrani A, 2018, INT CONF ELECTRO INF, P892, DOI 10.1109/EIT.2018.8500161
[4]  
Ameer M, 2018, J INF ASSUR SECUR, V13, P109
[5]  
Aminordin A, 2018, J THEOR APPL INF TEC, V96
[6]  
Aurangzeb S., 2018, MACHINE LEARNING BAS
[7]   Multinomial malware classification via low-level features [J].
Banin, Sergii ;
Dyrkolbotn, Geir Olav .
DIGITAL INVESTIGATION, 2018, 26 :S107-S117
[8]   Wild patterns: Ten years after the rise of adversarial machine learning [J].
Biggio, Battista ;
Roli, Fabio .
PATTERN RECOGNITION, 2018, 84 :317-331
[9]   Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection [J].
Chen, Jing ;
Wang, Chiheng ;
Zhao, Ziming ;
Chen, Kai ;
Du, Ruiying ;
Ahn, Gail-Joon .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) :1286-1300
[10]   Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection [J].
Ferrante, Alberto ;
Malek, Miroslaw ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Milosevic, Jelena .
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 :242-258