TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

被引:0
|
作者
Sood, Isha [1 ]
Sharma, Varsha [1 ]
机构
[1] Rajiv Gandhi Proudyogiki Vishwavidyalaya, Sch Informat Technol, Bhopal 462033, India
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 81卷 / 02期
关键词
Ransomware detection; transfer learning; unsupervised learning; co-clustering; cybersecurity; machine learning; lightweight cryptography; post-quantum cryptography; explainable AI; TLERAD;
D O I
10.32604/cmc.2024.055463
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method achieves high detection accuracy, with an AUC of 0.98 for known ransomware and 0.93 for unknown ransomware, significantly outperforming baseline methods. Comprehensive experiments demonstrate TLERAD's effectiveness in real-world scenarios, highlighting its adaptability to the rapidly evolving ransomware landscape. The paper also discusses future directions for enhancing TLERAD, including real-time adaptation, integration with lightweight and post-quantum cryptography, and the incorporation of explainable AI techniques.
引用
收藏
页码:2791 / 2818
页数:28
相关论文
共 50 条
  • [1] Enhancing Ransomware Attack Detection Using Transfer Learning and Deep Learning Ensemble Models on Cloud-Encrypted Data
    Singh, Amardeep
    Mushtaq, Zohaib
    Abosaq, Hamad Ali
    Mursal, Salim Nasar Faraj
    Irfan, Muhammad
    Nowakowski, Grzegorz
    ELECTRONICS, 2023, 12 (18)
  • [2] Ransomware Attack Detection on the Internet of Things Using Machine Learning Algorithm
    Zewdie, Temechu Girma
    Girma, Anteneh
    Cotae, Paul
    HCI INTERNATIONAL 2022 - LATE BREAKING PAPERS: INTERACTING WITH EXTENDED REALITY AND ARTIFICIAL INTELLIGENCE, 2022, 13518 : 598 - 613
  • [3] MIRAD: A Method for Interpretable Ransomware Attack Detection
    Marcinkowski, Bartosz
    Goschorska, Maja
    Wilenska, Natalia
    Siuta, Jakub
    Kajdanowicz, Tomasz
    IEEE ACCESS, 2024, 12 : 133810 - 133820
  • [4] Deep Transfer Learning for IoT Attack Detection
    Vu, Ly
    Quang Uy Nguyen
    Nguyen, Diep N.
    Dinh Thai Hoang
    Dutkiewicz, Eryk
    IEEE ACCESS, 2020, 8 : 107335 - 107344
  • [5] Ransomware Attack Modeling and Artificial Intelligence-Based Ransomware Detection for Digital Substations
    Alvee, Syed R. B.
    Ahn, Bohyun
    Kim, Taesic
    Su, Ying
    Youn, Young-Woo
    Ryu, Myung-Hyo
    2021 6TH IEEE WORKSHOP ON THE ELECTRONIC GRID (EGRID), 2021,
  • [6] Robust DDoS attack detection with adaptive transfer learning
    Anley, Mulualem Bitew
    Genovese, Angelo
    Agostinello, Davide
    Piuri, Vincenzo
    COMPUTERS & SECURITY, 2024, 144
  • [7] A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook
    Alqahtani, Abdullah
    Sheldon, Frederick T.
    SENSORS, 2022, 22 (05)
  • [8] Authentic Learning of Machine Learning to Ransomware Detection and Prevention
    Faruk, Md Jobair Hossain
    Masum, Mohammad
    Shahriar, Hossain
    Qian, Kai
    Lo, Dan
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 442 - 443
  • [9] Machine Learning Algorithms and Frameworks in Ransomware Detection
    Smith, Daryle
    Khorsandroo, Sajad
    Roy, Kaushik
    IEEE ACCESS, 2022, 10 : 117597 - 117610
  • [10] Explainable Ransomware Detection with Deep Learning Techniques
    Giovanni Ciaramella
    Giacomo Iadarola
    Fabio Martinelli
    Francesco Mercaldo
    Antonella Santone
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 317 - 330