Research article Special Issues

Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security

  • Received: 05 December 2023 Revised: 19 January 2024 Accepted: 23 January 2024 Published: 19 February 2024
  • MSC : 11Y40

  • With the widespread use of Internet, Internet of Things (IoT) devices have exponentially increased. These devices become vulnerable to malware attacks with the enormous amount of data on IoT devices; as a result, malware detection becomes a major problem in IoT devices. A reliable and effective mechanism is essential for malware detection. In recent years, research workers have developed various techniques for the complex detection of malware, but accurate detection continues to be a problem. Ransomware attacks pose major security risks to corporate and personal information and data. The owners of computer-based resources can be influenced by monetary losses, reputational damage, and privacy and verification violations due to successful assaults of ransomware. Therefore, there is a need to swiftly and accurately detect the ransomware. With this motivation, the study designs an Ebola optimization search algorithm for enhanced deep learning-based ransomware detection (EBSAEDL-RD) technique in IoT security. The purpose of the EBSAEDL-RD method is to recognize and classify the ransomware to achieve security in the IoT platform. To accomplish this, the EBSAEDL-RD technique employs min-max normalization to scale the input data into a useful format. Also, the EBSAEDL-RD technique makes use of the EBSA technique to select an optimum set of features. Meanwhile, the classification of ransomware takes place using the bidirectional gated recurrent unit (BiGRU) model. Then, the sparrow search algorithm (SSA) can be applied for optimum hyperparameter selection of the BiGRU model. The wide-ranging experiments of the EBSAEDL-RD approach are performed on benchmark data. The obtained results highlighted that the EBSAEDL-RD algorithm reaches better performance over other models on IoT security.

    Citation: Ibrahim R. Alzahrani, Randa Allafi. Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security[J]. AIMS Mathematics, 2024, 9(3): 6784-6802. doi: 10.3934/math.2024331

    Related Papers:

  • With the widespread use of Internet, Internet of Things (IoT) devices have exponentially increased. These devices become vulnerable to malware attacks with the enormous amount of data on IoT devices; as a result, malware detection becomes a major problem in IoT devices. A reliable and effective mechanism is essential for malware detection. In recent years, research workers have developed various techniques for the complex detection of malware, but accurate detection continues to be a problem. Ransomware attacks pose major security risks to corporate and personal information and data. The owners of computer-based resources can be influenced by monetary losses, reputational damage, and privacy and verification violations due to successful assaults of ransomware. Therefore, there is a need to swiftly and accurately detect the ransomware. With this motivation, the study designs an Ebola optimization search algorithm for enhanced deep learning-based ransomware detection (EBSAEDL-RD) technique in IoT security. The purpose of the EBSAEDL-RD method is to recognize and classify the ransomware to achieve security in the IoT platform. To accomplish this, the EBSAEDL-RD technique employs min-max normalization to scale the input data into a useful format. Also, the EBSAEDL-RD technique makes use of the EBSA technique to select an optimum set of features. Meanwhile, the classification of ransomware takes place using the bidirectional gated recurrent unit (BiGRU) model. Then, the sparrow search algorithm (SSA) can be applied for optimum hyperparameter selection of the BiGRU model. The wide-ranging experiments of the EBSAEDL-RD approach are performed on benchmark data. The obtained results highlighted that the EBSAEDL-RD algorithm reaches better performance over other models on IoT security.



    加载中


    [1] C. W. Tien, S. W. Chen, T. Ban, S. Y. Kuo, Machine learning framework to analyze iot malware using elf and opcode features, Digit. Threat. Res. Pract., 1 (2020), 1–19. https://doi.org/10.1145/3378448 doi: 10.1145/3378448
    [2] S. I. Bae, G. B. Lee, E. G. Im, Ransomware detection using machine learning algorithms, Concurr. Comput. Pract. Exp. 31 (2020), e5422.
    [3] S. Sharma, C. R. Krishna, R. Kumar, Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPU. In Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT), Giza, Egypt, 28–30 November 2020; IEEE: Piscataway, NJ, USA, 2020, 1–6. https://doi.org/10.1109/ACIT50332.2020.9300108
    [4] D. W. Fernando, N. Komninos, T. Chen, A study on the evolution of ransomware detection using machine learning and deep learning techniques, IoT, 1 (2020), 551–604. https://doi.org/10.3390/iot1020030 doi: 10.3390/iot1020030
    [5] U. Urooj, B. A. S. Al-rimy, A. Zainal, F. A. Ghaleb, M. A. Rassam, Ransomware detection using the dynamic analysis and machine learning: A survey and research directions, Appl. Sci. 12 (2021), 172. https://doi.org/10.3390/app12010172
    [6] R. Damaševiˇcius, A. Venˇckauskas, J. Toldinas, S. Grigaliunas, Ensemble-Based classification using neural networks and machine-learning models for windows pe malware detection, Electronics, 10 (2021), 485. https://doi.org/10.3390/electronics10040485 doi: 10.3390/electronics10040485
    [7] M. A. Almaiah, O. Almomani, A. Alsaaidah, S. Al-Otaibi, N. Bani-Hani, A. K. A. Hwaitat, et al., Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels, Electronics, 11 (2022), 3571. https://doi.org/10.3390/electronics11213571
    [8] A. H. Mohammad, T. Alwada'n, O. Almomani, S. Smadi, N. ElOmari, Bio-Inspired hybrid feature selection model for intrusion detection, Comput. Mater. Contin., 73 (2022), 133–150. https://doi.org/10.32604/cmc.2022.027475 doi: 10.32604/cmc.2022.027475
    [9] Y. Dion, S. N. Brohi, An experimental study to evaluate the performance of machine learning alogrithms in ransomware detection, J. Eng. Sci. Technol., 15 (2020), 967–981.
    [10] F. Noorbehbahani, F. Rasouli, M. Saberi, Analysis of machine learning techniques for ransomware detection, In Proceedings of the 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Mashhad, Iran, 28–29 August 2019; IEEE: Piscataway, NJ, USA, 2019,128–133. https://doi.org/10.1109/ISCISC48546.2019.8985139
    [11] X. Deng, M. Cen, M. Jiang, M. Lu, Ransomware early detection using deep reinforcement learning on portable executable header, Cluster Comput., 2023, 1–15. https://doi.org/10.1007/s10586-023-04043-5 doi: 10.1007/s10586-023-04043-5
    [12] Z. Yao, Z. Wang, T. Wu, W. Lu, A hybrid data-driven deep learning prediction framework for lake water level based on fusion of meteorological and hydrological multi-source data, Nat. Resour. Res., 2023, 1–28. https://doi.org/10.1007/s11053-023-10284-3
    [13] L. Almomani, A. Alkhayer, W. El-Shafai, E2E-RDS: Efficient End-to-End ransomware detection system based on Static-Based ML and Vision-Based DL approaches, Sensors, 23 (2023), 4467. https://doi.org/10.3390/s23094467
    [14] M. A. Alohali, M. Elsadig, F. N. Al-Wesabi, M. Al Duhayyim, A. M. Hilal, A. Motwakel, Optimal deep learning based ransomware detection and classification in the internet of things environment, Comput. Syst. Sci. Eng., 46 (2023). https://doi.org/10.32604/csse.2023.036802
    [15] H. Kim, J. Park, H. Kwon, K. Jang, H. Seo, Convolutional neural network-based cryptography ransomware detection for low-end embedded processors, Mathematics, 9 (2021), 705. https://doi.org/10.3390/math9070705 doi: 10.3390/math9070705
    [16] B. Zhang, W. Xiao, X. Xiao, A. K. Sangaiah, W. Zhang, J. Zhang, Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes, Future Gener. Comp. Sy., 110 (2020), 708–720. https://doi.org/10.1016/j.future.2019.09.025 doi: 10.1016/j.future.2019.09.025
    [17] Q. Abu Al-Haija, S. Zein-Sabatto, An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks, Electronics, 9 (2020), 2152. https://doi.org/10.3390/electronics9122152
    [18] H. Khalid, K. Mahmood, M. Khalid, M. Othman, M. Al Duhayyim, A. E Osman, et al., Optimal graph convolutional neural network-based ransomware detection for cybersecurity in IoT environment, Appl. Sci., 13 (2023), 5167. https://doi.org/10.3390/app13085167
    [19] A. R. Khan, A. Yasin, S. M. Usman, S. Hussain, S. Khalid, S. S. Ullah, Exploring lightweight deep learning solution for malware detection in IoT constraint environment, Electronics, 11 (2022), 4147. https://doi.org/10.3390/electronics11244147 doi: 10.3390/electronics11244147
    [20] M. Basnet, S. Poudyal, M. H. Ali, D. Dasgupta, Ransomware detection using deep learning in the SCADA system of electric vehicle charging station, In 2021 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), IEEE, 1–5. https://doi.org/10.1109/ISGTLatinAmerica52371.2021.9543031
    [21] M. Ghahramani, R. Taheri, M. Shojafar, R. Javidan, S. Wan, Deep Image: A precious image based deep learning method for online malware detection in IoT Environment, 2022. arXiv preprint arXiv: 2204.01690.
    [22] D. Singh, B. Singh, Investigating the impact of data normalization on classification performance, Appl. Soft Comput., 97 (2020), 105524. https://doi.org/10.1016/j.asoc.2019.105524 doi: 10.1016/j.asoc.2019.105524
    [23] O. N. Oyelade, A. E. Ezugwu, A bioinspired neural architecture search based convolutional neural network for breast cancer detection using histopathology images, Sci. Rep., 11 (2021), 19940. https://doi.org/10.1038/s41598-021-98978-7 doi: 10.1038/s41598-021-98978-7
    [24] M. D. Dangut, I. K. Jennions, S. King, Z. Skaf, A rare failure detection model for aircraft predictive maintenance using a deep hybrid learning approach, Neural Comput. Appl., 35 (2023), 2991–3009. https://doi.org/10.1007/s00521-022-07167-8 doi: 10.1007/s00521-022-07167-8
    [25] C. Li, J. Zhou, K. Du, D. Dias, Stability prediction of hard rock pillar using support vector machine optimized by three metaheuristic algorithms, Int. J. Min. Sci. Technol., 33 (2023), 1019–1036. https://doi.org/10.1016/j.ijmst.2023.06.001 doi: 10.1016/j.ijmst.2023.06.001
    [26] K. A. Alissa, D. H. Elkamchouchi, K. Tarmissi, A. Yafoz, R. Alsini, O. Alghushairy, et al., Dwarf Mongoose Optimization with machine-learning-driven ransomware detection in internet of things environment, Appl. Sci., 12 (2022), 9513. https://doi.org/10.3390/app12199513
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(333) PDF downloads(33) Cited by(0)

Article outline

Figures and Tables

Figures(10)  /  Tables(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog