Enhancing cybersecurity against ransomware attacks using LSTM deep learning method: A case study on android devices

被引:0
|
作者
Karaca, Hatice [1 ]
Tekerek, Adem [1 ]
机构
[1] Gazi Univ, Technol Fac, Comp Engn Dept, Ankara, Turkiye
关键词
Android; Ransomware; Deep Learning; SYSTEM;
D O I
10.2339/politeknik.1508722
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid advancement of technology brings new threats to the digital world. One of these threats is malicious ransomware attacks. Ransomware is malicious software that demands ransom from innocent users by blocking access to information systems. Since traditional methods are limited to predefined blacklists, they may be ineffective against unknown ransomware types. On the other hand, deep learning methods offer a sensitive defense mechanism against anomalies by learning standard behavior patterns. This study studied the Internet logs of Android devices consisting of 392,034 rows and 86 columns using the Long Short-Term Memory (LSTM) model. The dataset contains 14 different Android ransomware families and harmless traffic. Data preprocessing steps include missing data management, outlier analysis, feature selection, coding operations, and data normalization/standardization. The dataset was split at 80% training 20% test ratio, and it was determined that the 80% training 20% test split had the highest accuracy. The developed LSTM-based classification model achieved successful results with a 99% accuracy rate and 0.99 F1 score.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
    McCarthy, Andrew
    Ghadafi, Essam
    Andriotis, Panagiotis
    Legg, Phil
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [42] A Network Intrusion Detection System using Deep Learning against MQTT Attacks in IoT
    Mosaiyebzadeh, Fatemeh
    Araujo Rodriguez, Luis Gustavo
    Batista, Daniel Macedo
    Hirata Jr, R.
    2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021), 2021,
  • [43] Defending AI Models Against Adversarial Attacks in Smart Grids Using Deep Learning
    Avelino Sampedro, Gabriel
    Ojo, Stephen
    Krichen, Moez
    Alamro, Meznah A.
    Mihoub, Alaeddine
    Karovic, Vincent
    IEEE Access, 2024, 12 : 157408 - 157417
  • [44] A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN
    Zhang, Ming
    Xu, Boyi
    Bai, Shuai
    Lu, Shuaibing
    Lin, Zhechao
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 828 - 836
  • [45] Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models
    Almaraz-Rivera, Josue Genaro
    Perez-Diaz, Jesus Arturo
    Cantoral-Ceballos, Jose Antonio
    SENSORS, 2022, 22 (09)
  • [46] Enhancing Iris Authentication on Handheld Devices Using Deep Learning Derived Segmentation Techniques
    Bazrafkan, Shabab
    Corcoran, Peter
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [47] Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
    Loevenich, Johannes F.
    Bode, Jonas
    Huerten, Tobias
    Liberto, Luca
    Spelter, Florian
    Rettore, Paulo H. L.
    Lopes, Roberto Rigolin F.
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [48] Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach
    Hasan, Tooba
    Malik, Jahanzaib
    Bibi, Iram
    Khan, Wali Ullah
    Al-Wesabi, Fahd N.
    Dev, Kapal
    Huang, Gaojian
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2952 - 2963
  • [49] Securing web applications against XSS and SQLi attacks using a novel deep learning approach
    Jaydeep R. Tadhani
    Vipul Vekariya
    Vishal Sorathiya
    Samah Alshathri
    Walid El-Shafai
    Scientific Reports, 14
  • [50] Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
    Bursztein, Elie
    Invernizzi, Luca
    Král, Karel
    Moghimi, Daniel
    Picod, Jean-Michel
    Zhang, Marina
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 472 - 499