Show simple item record

dc.contributor.authorAhmed, Usman
dc.contributor.authorLin, Jerry Chun-Wei
dc.contributor.authorSrivastava, Gautam
dc.date.accessioned2023-03-24T11:41:56Z
dc.date.available2023-03-24T11:41:56Z
dc.date.created2022-04-24T14:40:32Z
dc.date.issued2022
dc.identifier.citationComputers & electrical engineering. 2022, 100 .en_US
dc.identifier.issn0045-7906
dc.identifier.urihttps://hdl.handle.net/11250/3060319
dc.description.abstractRansomware continues to pose a significant threat to cybersecurity by extorting money from users by locking their devices and personal data. The attackers force the payment of a ransom in order to restore access to personal files. Because of the structural similarity, detection of ransomware and benign applications becomes vulnerable to evasion attacks. Ensemble learning can provide countermeasures, while attackers can use the same technique to improve the effectiveness of their respective attacks. This motivates us to investigate whether the distinct ensemble method can achieve better performance when combined with the voting-based method. This research proposes a hybrid approach that examines permissions, text, and network-based features both statically and dynamically by monitoring memory usage, system call logs, and CPU usage. Ensemble machine learning analyzers on static and dynamic features extracted from Android malware applications (ransomware and non-ransomware) are then trained in the designed model. Our experimental results show that the proposed ensemble classification and detection technique can classify unknown static and dynamic ransomware behavior to mitigate adversarial evasion attacks.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleMitigating adversarial evasion attacks of ransomware using ensemble learningen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2022 The Author(s)en_US
dc.source.pagenumber14en_US
dc.source.volume100en_US
dc.source.journalComputers & electrical engineeringen_US
dc.identifier.doi10.1016/j.compeleceng.2022.107903
dc.identifier.cristin2018683
dc.source.articlenumber107903en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal