Openly accessible

Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches

Sharmeen, Shaila, Ahmed, Yahye Abukar, Huda, Shamsul, Kocer, Bari S and Hassan, Mohammad Mehdi 2020, Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches, IEEE Access, vol. 8, pp. 24522-24534, doi: 10.1109/access.2020.2970466.

Attached Files
Name Description MIMEType Size Downloads

Title Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches
Author(s) Sharmeen, Shaila
Ahmed, Yahye Abukar
Huda, ShamsulORCID iD for Huda, Shamsul orcid.org/0000-0001-7848-0508
Kocer, Bari S
Hassan, Mohammad Mehdi
Journal name IEEE Access
Volume number 8
Start page 24522
End page 24534
Total pages 13
Publisher Institute of Electrical and Electronics Engineers
Place of publication Piscataway, N.J.
Publication date 2020
ISSN 2169-3536
2169-3536
Keyword(s) Digital extortion
ransomware
deep learning
adaptive approaches
Summary Digital extortion has become a major cyber risk for many organizations; small-medium enterprises (SME) to large enterprises business and individual entrepreneurs. Ransomware is a kind of malware that is the main threat to digital extortion and has caused many organizations to lose huge revenue by paying much bigger ransom demands to the cybercriminals in recent years. The explosive growth of ransomware is due to the existing large infection vector such as social engineering, email attachment, zip file download, browsing malicious site, infected search engine which are boosted dramatically by easily available cryptographic tools, Ransomware As a Service (RaaS), increased cloud storage and off-the-self ransomware toolkits. The large infection vector and available toolkits not only grew ransomware extremely, but also made them more obfuscated, encrypted and varying patterns in the new variants. This, in turn, caused the conventional supervised analysis and detection engine to fail to detect the new variants of ransomware. This paper addresses the limitations of conventional supervised detection engine and proposes semi-supervised framework to compute the inherent latent sources of the varying patterns in the new variants in an unsupervised way using deep learning approaches. The proposed framework extracts the inherent characteristics in the varying patterns from the unlabelled ransomware obtained from the wild which is scalable to accommodate upcoming malicious executables. Then the unsupervised learned model is combined with supervised classification, thus constructing an adaptive detection model. The proposed framework has been verified using real ransomware data with a dynamic analysis testbed. Our extensive experimental results and discussion demonstrate that the proposed adaptive framework can successfully identify different variants of ransomware and achieve higher performance than existing supervised approaches.
Language eng
DOI 10.1109/access.2020.2970466
Indigenous content off
HERDC Research category C1 Refereed article in a scholarly journal
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30134864

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 62 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Sun, 09 Feb 2020, 13:55:30 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.