With the widespread use of Internet, Internet of Things (IoT) devices have exponentially increased. These devices become vulnerable to malware attacks with the enormous amount of data on IoT devices; as a result, malware detection becomes a major problem in IoT devices. A reliable and effective mechanism is essential for malware detection. In recent years, research workers have developed various techniques for the complex detection of malware, but accurate detection continues to be a problem. Ransomware attacks pose major security risks to corporate and personal information and data. The owners of computer-based resources can be influenced by monetary losses, reputational damage, and privacy and verification violations due to successful assaults of ransomware. Therefore, there is a need to swiftly and accurately detect the ransomware. With this motivation, the study designs an Ebola optimization search algorithm for enhanced deep learning-based ransomware detection (EBSAEDL-RD) technique in IoT security. The purpose of the EBSAEDL-RD method is to recognize and classify the ransomware to achieve security in the IoT platform. To accomplish this, the EBSAEDL-RD technique employs min-max normalization to scale the input data into a useful format. Also, the EBSAEDL-RD technique makes use of the EBSA technique to select an optimum set of features. Meanwhile, the classification of ransomware takes place using the bidirectional gated recurrent unit (BiGRU) model. Then, the sparrow search algorithm (SSA) can be applied for optimum hyperparameter selection of the BiGRU model. The wide-ranging experiments of the EBSAEDL-RD approach are performed on benchmark data. The obtained results highlighted that the EBSAEDL-RD algorithm reaches better performance over other models on IoT security.
Citation: Ibrahim R. Alzahrani, Randa Allafi. Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security[J]. AIMS Mathematics, 2024, 9(3): 6784-6802. doi: 10.3934/math.2024331
With the widespread use of Internet, Internet of Things (IoT) devices have exponentially increased. These devices become vulnerable to malware attacks with the enormous amount of data on IoT devices; as a result, malware detection becomes a major problem in IoT devices. A reliable and effective mechanism is essential for malware detection. In recent years, research workers have developed various techniques for the complex detection of malware, but accurate detection continues to be a problem. Ransomware attacks pose major security risks to corporate and personal information and data. The owners of computer-based resources can be influenced by monetary losses, reputational damage, and privacy and verification violations due to successful assaults of ransomware. Therefore, there is a need to swiftly and accurately detect the ransomware. With this motivation, the study designs an Ebola optimization search algorithm for enhanced deep learning-based ransomware detection (EBSAEDL-RD) technique in IoT security. The purpose of the EBSAEDL-RD method is to recognize and classify the ransomware to achieve security in the IoT platform. To accomplish this, the EBSAEDL-RD technique employs min-max normalization to scale the input data into a useful format. Also, the EBSAEDL-RD technique makes use of the EBSA technique to select an optimum set of features. Meanwhile, the classification of ransomware takes place using the bidirectional gated recurrent unit (BiGRU) model. Then, the sparrow search algorithm (SSA) can be applied for optimum hyperparameter selection of the BiGRU model. The wide-ranging experiments of the EBSAEDL-RD approach are performed on benchmark data. The obtained results highlighted that the EBSAEDL-RD algorithm reaches better performance over other models on IoT security.
[1] | C. W. Tien, S. W. Chen, T. Ban, S. Y. Kuo, Machine learning framework to analyze iot malware using elf and opcode features, Digit. Threat. Res. Pract., 1 (2020), 1–19. https://doi.org/10.1145/3378448 doi: 10.1145/3378448 |
[2] | S. I. Bae, G. B. Lee, E. G. Im, Ransomware detection using machine learning algorithms, Concurr. Comput. Pract. Exp. 31 (2020), e5422. |
[3] | S. Sharma, C. R. Krishna, R. Kumar, Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPU. In Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT), Giza, Egypt, 28–30 November 2020; IEEE: Piscataway, NJ, USA, 2020, 1–6. https://doi.org/10.1109/ACIT50332.2020.9300108 |
[4] | D. W. Fernando, N. Komninos, T. Chen, A study on the evolution of ransomware detection using machine learning and deep learning techniques, IoT, 1 (2020), 551–604. https://doi.org/10.3390/iot1020030 doi: 10.3390/iot1020030 |
[5] | U. Urooj, B. A. S. Al-rimy, A. Zainal, F. A. Ghaleb, M. A. Rassam, Ransomware detection using the dynamic analysis and machine learning: A survey and research directions, Appl. Sci. 12 (2021), 172. https://doi.org/10.3390/app12010172 |
[6] | R. Damaševiˇcius, A. Venˇckauskas, J. Toldinas, S. Grigaliunas, Ensemble-Based classification using neural networks and machine-learning models for windows pe malware detection, Electronics, 10 (2021), 485. https://doi.org/10.3390/electronics10040485 doi: 10.3390/electronics10040485 |
[7] | M. A. Almaiah, O. Almomani, A. Alsaaidah, S. Al-Otaibi, N. Bani-Hani, A. K. A. Hwaitat, et al., Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels, Electronics, 11 (2022), 3571. https://doi.org/10.3390/electronics11213571 |
[8] | A. H. Mohammad, T. Alwada'n, O. Almomani, S. Smadi, N. ElOmari, Bio-Inspired hybrid feature selection model for intrusion detection, Comput. Mater. Contin., 73 (2022), 133–150. https://doi.org/10.32604/cmc.2022.027475 doi: 10.32604/cmc.2022.027475 |
[9] | Y. Dion, S. N. Brohi, An experimental study to evaluate the performance of machine learning alogrithms in ransomware detection, J. Eng. Sci. Technol., 15 (2020), 967–981. |
[10] | F. Noorbehbahani, F. Rasouli, M. Saberi, Analysis of machine learning techniques for ransomware detection, In Proceedings of the 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Mashhad, Iran, 28–29 August 2019; IEEE: Piscataway, NJ, USA, 2019,128–133. https://doi.org/10.1109/ISCISC48546.2019.8985139 |
[11] | X. Deng, M. Cen, M. Jiang, M. Lu, Ransomware early detection using deep reinforcement learning on portable executable header, Cluster Comput., 2023, 1–15. https://doi.org/10.1007/s10586-023-04043-5 doi: 10.1007/s10586-023-04043-5 |
[12] | Z. Yao, Z. Wang, T. Wu, W. Lu, A hybrid data-driven deep learning prediction framework for lake water level based on fusion of meteorological and hydrological multi-source data, Nat. Resour. Res., 2023, 1–28. https://doi.org/10.1007/s11053-023-10284-3 |
[13] | L. Almomani, A. Alkhayer, W. El-Shafai, E2E-RDS: Efficient End-to-End ransomware detection system based on Static-Based ML and Vision-Based DL approaches, Sensors, 23 (2023), 4467. https://doi.org/10.3390/s23094467 |
[14] | M. A. Alohali, M. Elsadig, F. N. Al-Wesabi, M. Al Duhayyim, A. M. Hilal, A. Motwakel, Optimal deep learning based ransomware detection and classification in the internet of things environment, Comput. Syst. Sci. Eng., 46 (2023). https://doi.org/10.32604/csse.2023.036802 |
[15] | H. Kim, J. Park, H. Kwon, K. Jang, H. Seo, Convolutional neural network-based cryptography ransomware detection for low-end embedded processors, Mathematics, 9 (2021), 705. https://doi.org/10.3390/math9070705 doi: 10.3390/math9070705 |
[16] | B. Zhang, W. Xiao, X. Xiao, A. K. Sangaiah, W. Zhang, J. Zhang, Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes, Future Gener. Comp. Sy., 110 (2020), 708–720. https://doi.org/10.1016/j.future.2019.09.025 doi: 10.1016/j.future.2019.09.025 |
[17] | Q. Abu Al-Haija, S. Zein-Sabatto, An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks, Electronics, 9 (2020), 2152. https://doi.org/10.3390/electronics9122152 |
[18] | H. Khalid, K. Mahmood, M. Khalid, M. Othman, M. Al Duhayyim, A. E Osman, et al., Optimal graph convolutional neural network-based ransomware detection for cybersecurity in IoT environment, Appl. Sci., 13 (2023), 5167. https://doi.org/10.3390/app13085167 |
[19] | A. R. Khan, A. Yasin, S. M. Usman, S. Hussain, S. Khalid, S. S. Ullah, Exploring lightweight deep learning solution for malware detection in IoT constraint environment, Electronics, 11 (2022), 4147. https://doi.org/10.3390/electronics11244147 doi: 10.3390/electronics11244147 |
[20] | M. Basnet, S. Poudyal, M. H. Ali, D. Dasgupta, Ransomware detection using deep learning in the SCADA system of electric vehicle charging station, In 2021 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), IEEE, 1–5. https://doi.org/10.1109/ISGTLatinAmerica52371.2021.9543031 |
[21] | M. Ghahramani, R. Taheri, M. Shojafar, R. Javidan, S. Wan, Deep Image: A precious image based deep learning method for online malware detection in IoT Environment, 2022. arXiv preprint arXiv: 2204.01690. |
[22] | D. Singh, B. Singh, Investigating the impact of data normalization on classification performance, Appl. Soft Comput., 97 (2020), 105524. https://doi.org/10.1016/j.asoc.2019.105524 doi: 10.1016/j.asoc.2019.105524 |
[23] | O. N. Oyelade, A. E. Ezugwu, A bioinspired neural architecture search based convolutional neural network for breast cancer detection using histopathology images, Sci. Rep., 11 (2021), 19940. https://doi.org/10.1038/s41598-021-98978-7 doi: 10.1038/s41598-021-98978-7 |
[24] | M. D. Dangut, I. K. Jennions, S. King, Z. Skaf, A rare failure detection model for aircraft predictive maintenance using a deep hybrid learning approach, Neural Comput. Appl., 35 (2023), 2991–3009. https://doi.org/10.1007/s00521-022-07167-8 doi: 10.1007/s00521-022-07167-8 |
[25] | C. Li, J. Zhou, K. Du, D. Dias, Stability prediction of hard rock pillar using support vector machine optimized by three metaheuristic algorithms, Int. J. Min. Sci. Technol., 33 (2023), 1019–1036. https://doi.org/10.1016/j.ijmst.2023.06.001 doi: 10.1016/j.ijmst.2023.06.001 |
[26] | K. A. Alissa, D. H. Elkamchouchi, K. Tarmissi, A. Yafoz, R. Alsini, O. Alghushairy, et al., Dwarf Mongoose Optimization with machine-learning-driven ransomware detection in internet of things environment, Appl. Sci., 12 (2022), 9513. https://doi.org/10.3390/app12199513 |