Next Article in Journal
Reliability of Social Networks on Activity-on-Node Binary-State with Uncertainty Environments
Previous Article in Journal
Scalable Dew Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment

1
SAUDI ARAMCO Cybersecurity Chair, Networks and Communications Department, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
2
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
3
Department of Computer Sciences, College of Computing and Information System, Umm Al-Qura University, Mecca 24382, Saudi Arabia
4
Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia
5
Department of Information Systems and Technology, College of Computer Science and Engineering, University of Jeddah, Jeddah 21589, Saudi Arabia
6
Research Centre, Future University in Egypt, New Cairo 11845, Egypt
7
Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(19), 9513; https://doi.org/10.3390/app12199513
Submission received: 7 August 2022 / Revised: 3 September 2022 / Accepted: 17 September 2022 / Published: 22 September 2022
(This article belongs to the Section Computing and Artificial Intelligence)

Abstract

:
The internet of things (ransomware refers to a type of malware) is the concept of connecting devices and objects of all types on the internet. IoT cybersecurity is the task of protecting ecosystems and IoT gadgets from cyber threats. Currently, ransomware is a serious threat challenging the computing environment, which needs instant attention to avoid moral and financial blackmail. Thus, there comes a real need for a novel technique that can identify and stop this kind of attack. Several earlier detection techniques followed a dynamic analysis method including a complex process. However, this analysis takes a long period of time for processing and analysis, during which the malicious payload is often sent. This study presents a new model of dwarf mongoose optimization with machine-learning-driven ransomware detection (DWOML-RWD). The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the feature selection process is initially carried out using an enhanced krill herd optimization (EKHO) algorithm by the use of dynamic oppositional-based learning (QOBL). For ransomware detection, DWO with an extreme learning machine (ELM) classifier can be utilized. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset. The experimental results highlight the superiority of the DWOML-RWD model over other approaches.

1. Introduction

The internet of things (IoT) can be described as the increasing number of physical devices connected to the internet. Embedded with sensor nodes and software that can collect and share data online, IoT gadgets are invaluable in improving productivity and enhancing a massive number of processes throughout industries [1]. Inappropriately, the nature of IoT gadgets’ connectivity paves the way for malicious performers to take full advantage, especially because of the top ten vulnerabilities that make IoT gadgets insecure [2]. To achieve the scalability objective of the network, research workers in the past established several clustering methods. In a clustered network, every cluster can be assigned a gateway that sends packets to and from the base station (BS), considering that a cellular structure can be utilized for providing internet access to IoT nodes [3].
A node with good resources can be selected as a gateway. Compromising or capturing the gateway will affect every node in the cluster, and, thus, gateway security assaults should be protected against attacks [4]. Invaders usually encode victims’ data with their keys, and they decode the data or return the key only after the victims fulfill or pay their demands [5]. Previously, ransomware would simply disrupt the services and make the data inaccessible to the victim; until now, they were safely saved only on their system [6]. Now, data can also be stolen by attackers, and they threaten the victim to pay money. Additionally, it is not certain that the data can be retrieved when the ransom is paid or if the attackers leak the stolen data.
Ransomware is irreversible and tedious to stop, unlike other security issues. The approach of this malware depends on access limitations to user files via encryption and demands a ransom to attain the decryption key. An invader usually shows a ransom note after encoding the data of the victim, which generally indicates that the attack was executed; then, the invader demands money [7]. The attacker mentions the steps for making a payment with the ransom note that they offered. Ransomware attacks could cause trouble to the distributed IoT atmosphere and halt smooth work amongst heterogeneous data centers. Such mechanisms contain complicated structures of methods and corpora. Environments that are data centers have a huge magnitude of data and could pay money for avoiding damage to their reputation and exploitation of their data [8].
In the literature, three different studies are performed for ransomware detection: hybrid, static, and dynamic. Each analysis technique has pros and cons [9]. Dynamic analysis provides higher accuracy in detection through the execution of the samples. Deep learning (DL) and machine learning (ML) have effects on all aspects of life. Such technology has several applications in each domain because of its capability for decision making. Advanced assault and threat detection is easier and occurs in less time, because of the use of such effective technologies. DL is considered the optimal method for detecting the paradigms of an undergoing system [10].
ML and DL technologies have received considerable attention and are massively utilized in the advanced research of cybersecurity. ML technologies are utilized in the domain of ransomware detection, such as logistic regression (LR), random forest (RF), k-nearest neighbor (KNN), naïve Bayes (NB), and neural networks (NNs). In addition, DL models, such as deep neural networks (DNNs) and the deep autoencoder (AE), are also used for ransomware detection. Though several ransomware detection models are available in the literature, there is still a need to develop automated ransomware detection tools for enhanced performance. At the same time, the trial-and-error parameter-tuning process is difficult and erroneous. Therefore, a metaheuristics-based parameter-tuning process is essential.
This study presents a new model of dwarf mongoose optimization with machine-learning-driven ransomware detection (DWOML-RWD). The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the feature selection process is initially carried out using an enhanced krill herd optimization (EKHO) algorithm by the use of dynamic oppositional-based learning (QOBL). For ransomware detection, DWO with an extreme learning machine (ELM) classifier was utilized. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset.

2. Related Works

In [11], the authors use DL methods to extract the latent representation of a high dimension of data, which is collected for identifying malicious behavior precisely. To be specific, the method that the authors present depends on a hybrid-feature engineering method of variational and classical autoencoders. This hybrid method can be utilized for reducing the data dimension and extracts a good representation of the gathered system actions. Then, the new feature vector can be sent to a classifier that can be constructed based on batch-normalizing methods and a DNN. Aurangzeb et al. [12] develop BigRC-EML for ransomware classification and detection based on numerous dynamic and static features. The author leverage ensemble ML techniques on big data to predict the accuracy of ransomware detection. Though several ML techniques have been utilized in the identification of ransomware, the assessment of ensemble techniques has not yet been conducted. In addition, a novel feature-selecting technique related to PCA can be used to diminish the feature dimension.
Masum et al. [13] propose a feature-selection-related structure by adopting various ML methods, which include NN-related structures, to classify the security level for the prevention and detection of ransomware. The authors implement many ML techniques, namely, LR, DT, NB, NN-related classifiers, and RF, on a selected number of features for classifying ransomware. Ogundokun et al. [14] introduce an ML technique for detecting ransomware assaults on IoT gadgets. The study utilizes power for tracking and reviewing power utilization in 500 ms internals of every operating process. The paper utilizes three gadgets for performing the experiment: a projector, an android device, and a laptop computer. The method is used to monitor the power utilization of IoT gadgets utilizing several processes for the categorization of ransomware outside non-malicious functions.
The authors of [15] present a weighted minimum redundancy maximum relevance (WmRmR) method for the prediction of superior feature significance in data taken at the initial phases of ransomware assaults. The method integrates an improvised mRMR (EmRmR) with term frequency–inverse document frequency (TF-IDF); therefore, it can filter runtime and noisy conduct based on the weights computed by TF-IDF. Du et al. [16] demonstrate an intellectual KNN and density-related ML method for detecting ransomware pre-attacks on an endpoint mechanism. The feature engineering and data pre-processing methods are augmented with the KNN method to find the solution. The study of malware detection, utilizing advanced ML methods to advance highly proficient ransomware defensive solutions for the detection and prevention of ransomware pre-attack, aids endpoint security provider companies, anti-malware developers, vendors, and authors. Al-Hawawreh and Sitnikova [17] model a detection method related to stacked VAE and FC-NN, and they are able to study the latent structure of system actions and expose ransomware conduct. Moreover, the authors develop a data augmentation technique based on VAE to generate novel data that are employed in training an FC network for improvising the generalized abilities of the developed detection method.

3. The Proposed Model

In this article, a new DWOML-RWD method is introduced for cyberattack detection in the IoT environment. The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the EKHO algorithm is used to perform the feature selection process. For ransomware detection, DWO with an ELM classifier is used. Figure 1 shows a block diagram of the DWOML-RWD approach.

3.1. Feature Selection: EKHO Algorithm

In the presented DWOML-RWD technique, the EKHO algorithm is used to perform the feature selection process. The KHO algorithm is inspired by the herding behavior of individual krill that is expressed by random diffusion, induced movement, and foraging activity [18]. For weight optimization, we employed the KHO technique; it is able to resolve optimization problems effectively. It is the more commonly employed heuristics optimization technique. This method imitates the krill individual (KI) behavior in KH. It contains two chief goals: (1) attaining food and (2) augmenting krill density. The position of KI can be affected by the following factors: (1) random diffusion; (2) movement inspired by other KI; and (3) foraging activity. Hence, the krill position is formulated using the Lagrangian model in the following:
d U i d t = M o i + F a i + D f i ,
where:
M o i —movement guided by other K I .
F a i —foraging movement.
D f i i KI physical diffusion.
The steps are shown below.
Step 1: the motion of the direction of KI can be defined using repulsive swarm density, local swarm, and target swarm as follows:
M o i n e w = M a m α i + ω n M i o l d ,  
where:
M a m —maximum induced speed.
ω n —motion inertia weight within 0 , 1 .
M i o l d —last motion induced.
α i is estimated by Equation (3)
α i = α i l o c a l + α i t a r g e t  
α i l o c a l denotes the local effects of a neighbor of i - th individuals, and α i t a r g e t represents the optimum solution direction from i th individuals.
α i t a r g e t = I b K i b X i b ,  
In Equation (4), I b indicates the coefficient and determined α i t a r g e t for i - th individuals.
I b = 2 r a + 1 I m a ,  
where r a refers to the random number within 0 , 1 .
Step 2: The foraging behavior can be estimated by
F a i = S p f γ i + ω f F a i o l d ,  
where
γ i = γ i b e s t + B i b e s t ,  
Here, S p f denotes the foraging speed, ω f shows the inertia weight for foraging, and B i b e s t represents the optimal solution.
Step 3: The physical diffusion of KI is an arbitrary method, and the movement related to D f i and δ is evaluated in the following expression:
D f i = D f m δ ,  
In Equation (8), D f i represents the maximal diffusion speed, and δ denotes the random directional vector and arrays of random numbers in 1 , 1 . The movement of the krill swarm determines the procedure that identifies the optimum fitness. Hence, the KI location can be given as follows:
U i t + Δ t = U i t + Δ t d U i d t .  
The variable Δ t is crucial and regarded as a scaling factor of the speed vector. Hence, it should be modified regarding the optimization problem. The value of Δ t fully depends on the search space.
The EKHO algorithm was designed by using the DOBL concept. The OBL method was utilized for generating a unique opposition solution to the present solution [19]. It tries to produce the optimum solution, which leads to the speed rate of the convergences being enhanced. The opposite X 0 of a provided real number X U ,   L is measured as:
X 0 = U + L X  
The opposite point, X = X 1 ,   X 2 , ,   X D i m , is a point from D i m -dimensional searching space, X 1 ,   X 2 , , X D i m R , and X j U j , L j . Therefore, the opposite point X 0 of X is represented as:
X j 0 = U B j + L j X j ,   w h e r e   j = 1 . D .  
Compared with the opposite point, the dynamic opposite preference X D O of value X is defined as:
X D o = X + w × r 8 r 9 × X 0 X , w > 0  
where r 8 and r 9 signify the arbitrary values from the range of [0,1], and w signifies the weighted agent. Therefore, the dynamic opposite value X j D O of X is equivalent to X 1 ,   X 2 , ,   X D i m , which is written as:
X j D o = X j + w × r a n d r a n d × X j 0 X j , w > 0  
Therefore, the DOBL optimizer starts by generating the primary solutions ( X = X 1 , ,   X D i m and computes their dynamic opposite values X D o utilized in Equation (13). Afterward, it is dependent upon the provided fitness value.
The fitness function (FF) employed in the EKHO technique contains a balance amongst the count of selective features from every solution (minimal) and classifier accuracy (maximum) achieved by using such selective features. Equation (14) defines the FF to estimate solutions.
F i t n e s s = α γ R D + β R C  
in which γ R D signifies the classifier error rate of a provided classification, R implies the cardinality of the chosen subset, and C indicates the entire count of features from a dataset; α , and β are two parameters corresponding to the significance of subset length and classifier quality. ∈ [1, 0] and β = 1 α .

3.2. Ransomware Detection: ELM Model

For ransomware detection, the ELM classifier is used. In various fields, the ELM method is used for pattern recognition, wind speed forecasting, and fault diagnosis. The ELM method involves three layers: input, output, and hidden layers [20]. Figure 2 showcases the framework of ELM. By using the backpropagation model, the feedforward neural network must upgrade the weight in the iteration method; however, the ELM mechanism has a random initial weight that does not need to be upgraded in the iterative method. Consider that T = { c i ,   e i | c i R n ,   e i R n } denotes the training instances and F . indicates the activation function. The ELM method is formulated below:
i = 1 N h α j F ρ j c 1 + θ j = e 1
i = 1 N h α i F ρ i c 2 + θ i = e 2  
i = 1 N k α i F ρ i c N s + θ i = e N s
Here, θ i signifies the threshold of the hidden node; α i signifies the weight linking the output and hidden nodes; ρ i shows the weight connecting the input and the hidden node; c i signifies the input sample of the module; e i denotes the output sample of models; and N s characterizes the sample count:
Y α = e  
Y = F ρ 1 c 1 + θ 1 F ρ N h c 1 + θ N h F ρ 1 c N s + θ l F ρ N h c N s + θ N h  
α = [ α 1 ,   ,   α N h ] T  
e = [ e 1 , , e N s ] T  
Here, e denotes the sample label matrix; Y indicates the hidden layer output matrixes; α indicates the weight matrix; and N h shows the node count in a hidden state. The hidden layer threshold and input weight of the ELM algorithm are determined randomly. In the iteration model, the weight vector does not need to be modified; only the output weight needs to be evaluated and is given below:
α = ( Y T Y ) 1 Y T e  
The ELM predictive method can be attained.
e = i = 1 N h α j F ρ i c + θ i  
The computation method of ELM is given as follows:
(1)
Define the model sample;
(2)
Initialize the hidden layer threshold and input weight randomly;
(3)
Compute the output matrix;
(4)
Resolve the output weight of the hidden layer.

3.3. Parameter Optimization: DWO Algorithm

In this work, the design of the DWO algorithm aids in the optimal parameter selection of the ELM model. This model mimics the behavior of the dwarf mongoose while searching for its food. Usually, DWO initiates by fixing the first value in a sequence of solutions through the subsequent Equation [21]:
x i , j = l j + r a n d × u j l j  
In Equation (22), r a n d denotes an arbitrary value integrated within [0,1], while u j and l j indicate the limit of the search domain. The swarming of DWO comprises three groups, namely, babysitters, the alpha group, and scouts. Every group has its own means of capturing food, and this is discussed below:
  • Alpha Group
The fitness of every solution can be calculated when the population is introduced. Equation (23) computes the probability value for the fitness of the population, and α the alpha female is selected according to the probability
α = f i t i Σ i = 1 n f i t i  
n corresponds to the mongoose counts in the alpha group. The babysitter’s number is represented as bs. Peep shows the vocalization of the leading female, which keeps the family on track.
Every mongoose sleeps in the initial sleeping mounds that are fixed . The DWO applies the expression for generating a candidate food location.
X i + 1 = X j + p h i × p e e p  
The sleeping mound is given as follows in every reiteration, in which p h i indicates a uniform distribution random number 1 , 1 .
s m i = f i t i + 1 f i t i   max   f i t i + 1 , f i t i  
Equation (26) encompasses the average value of the sleeping mound.
φ = Σ i = 1 n s m i n  
When the babysitting exchange condition is satisfied, it progresses to the scouting stage; wherever the sleeping mound or following food source is, is taken into account.
  • Scouts
Since mongooses are known to not return to earlier sleeping mounds, the scout looks for the sleeping mounds, which ensures exploration. For this method, foraging and scouting are implemented simultaneously. This motion is modeled after an unsuccessful or successful search for sleeping mounds. In other words, the movement of mongooses is dependent on the overall accuracy. In that regard, if the family forages some distance, they come to a novel sleeping mound as shown below.
X i + 1 = X i C F p h i r a n d X i M   i f   φ i + 1 > φ i     X i + C F p h i r a n d X i M  
In Equation (27), r a n d denotes an arbitrary value within 0 , 1 , and C F = ( 1 i i e r Max i t e r ) 2 i t e r Max i t e r , where the variable that regulates the mongoose group collective–volitive motion is linearly reduced as the iteration progresses. M = Σ i = 1 n X i × s m i X i , whereby the mongoose motion to the novel sleeping mounds is defined.
  • Babysitters
Usually, babysitters are small group members that remain with the young and are cycled daily to assist the alpha female (mother) in leading the remaining group on regular foraging expeditions. The fitness weight is fixed as zero, which ensures that the average weight of the alpha group is reduced in the following iteration, which obstructs the movement of the group and intensifies exploitation. Algorithm Al encompasses the pseudo-code for the proposed method.

4. Results and Discussion

The proposed model was simulated using a Python 3.6.5 tool on PC i5-8600k, GeForce 1050Ti 4GB, 16GB RAM, 250GB SSD, and 1TB HDD. The parameter settings are as follows: learning rate, 0.01; dropout, 0.5; batch size, 5; epoch count, 50; and activation, ReLU. The experimental assessment of the DWOML-RWD algorithm was carried out utilizing a dataset comprising 840 samples. The dataset holds 420 goodware samples and 420 ransomware samples as depicted in Table 1.
Figure 3 illustrates the set of confusion matrices formed by the DWOML-RWD model in different runs. With run-1, the DWOML-RWD model classified 412 samples into goodware and 417 samples into ransomware. At the same time, with run-2, the DWOML-RWD model classified 413 samples into goodware and 416 samples into ransomware. Simultaneously, with run-3, the DWOML-RWD model classified 415 samples into goodware and 418 samples into ransomware. Additionally, with run-4, the DWOML–-RWD model classified 414 samples into goodware and 418 samples into ransomware. Lastly, with run-5, the DWOML-RWD model classified 416 samples into goodware and 419 samples into ransomware.
Table 2 displays the overall classification results of the DWOML-RWD model on ransomware detection. Figure 4 reports a brief ransomware classification performance of the DWOML-RWD model in terms of a c c u y , s e n s y , s p e c y , and F s c o r e . The results imply that the DWOML-RWD model ensured enhanced performance under both classes. For instance, on run-1, the DWOML-RWD model attained an average a c c u y , s e n s y , s p e c y , and F s c o r e of 98.69%, 98.69%, 98.69%, and 98.69%, respectively. Meanwhile, on run-2, the DWOML-RWD model gained an average a c c u y , s e n s y , s p e c y , and F s c o r e of 98.69%, 98.69%, 98.69%, and 98.69%, respectively. Furthermore, on run-3, the DWOML-RWD model achieved an average a c c u y , s e n s y , s p e c y , and F s c o r e of 99.17%, 99.17%, 99.17%, and 99.17%, respectively. Further, on run-4, the DWOML-RWD model acquired an average a c c u y , s e n s y , s p e c y , and F s c o r e of 99.05%, 99.05%, 99.05%, and 99.05%, respectively. Lastly, on run-5, the DWOML-RWD model obtained an average a c c u y , s e n s y , s p e c y , and F s c o r e of 99.40%, 99.40%, 99.40%, and 99.40%, respectively.
Figure 5 demonstrates the detailed ransomware classification performance of the DWOML-RWD approach in terms of FNR and FPR. The results denote that the DWOML–-RWD approach ensured enhanced performance under both classes. For example, on run-1, the DWOML-RWD model attained an average FNR and FPR of 1.31% and 1.31%, respectively. In parallel, on run-2, the DWOML-RWD model obtained an average FNR and FPR of 1.31% and 1.31%, respectively. Additionally, on run-3, the DWOML-RWD model gained an average FNR and FPR of 0.83% and 0.83%, respectively. Further, on run-4, the DWOML-RWD model reached an average FNR and FPR of 0.95% and 0.95%, respectively. Lastly, on run-5, the DWOML-RWD model obtained an average FNR and FPR of 0.60% and 0.60%, respectively.
The training accuracy (TRA) and validation accuracy (VLA) acquired by using the DWOML-RWD approach on the test dataset are exemplified in Figure 6. The experimental outcome represented by the DWOML-RWD technique attained higher values of TRA and VLA. Seemingly, the VLA is greater than TRA.
The training loss (TRL) and validation loss (VLL) attained by using the DWOML-RWD method on the test dataset are exhibited in Figure 7. The experimental outcome denotes the DWOML-RWD approach exhibited the lowest values of TRL and VLL. Particularly, the VLL is lower than the TRL.
A clear precision–recall inspection of the DWOML-RWD approach on the test dataset is portrayed in Figure 8. The figure exemplifies that the DWOML-RWD methodology resulted in enhanced values of precision–recall values under all classes.
A brief ROC analysis of the DWOML-RWD approach on the test dataset is portrayed in Figure 9. The results imply that the DWOML-RWD method displayed an ability to categorize distinct classes on the test dataset.
Table 3 presents the ransomware detection results of the DWOML-RWD model compared with other ML models. These results indicate that the DWOML-RWD model displays better performance than the other methods [22]. Figure 10 provides a comparative s e n s y and s p e c y inspection of the DWOML-RWD technique with other existing approaches. The figure reveals that the DWOML-RWD model showed improved performance in all aspects. For instance, based on s e n s y , the DWOML-RWD approach gained enhanced s e n s y of 99.40%, whereas the Adaboost-M1, bagging, ROF, RF, and DT methodologies resulted in lower s e n s y values of 94.60%, 93.80%, 96.90%, 99.21%, and 98.12%, respectively.
Figure 11 provides a comparative FNR and FPR inspection of the DWOML-RWD algorithm with other existing approaches. The figure reveals that the DWOML-RWD model shows improved performance in all aspects. For instance, based on FNR, the DWOML-RWD approach attained a minimal FNR of 0.60%, whereas the Adaboost-M1, bagging, ROF, RF, and DT models resulted in increased FNR values of 5.40%, 6.20%, 3.10%, 0.79%, and 1.88, respectively. Additionally, based on PNR, the DWOML-RWD approach gained a minimal PNR of 0.60%, whereas the Adaboost-M1, bagging, ROF, RF, and DT techniques resulted in increased PNR values of 5%, 3.50%, 2.60%, 1.30%, and 1.49, respectively. From these results, it was confirmed that the DWOML-RWD model assured enhanced performance.

5. Conclusions

In this article, a new DWOML-RWD method was introduced for cyberattack detection in the IoT environment. The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the EKHO algorithm was used to perform the feature selection process. For ransomware detection, DWO with an ELM classifier was used. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset. The experimental outcomes highlight the superiority of the DWOML-RWD model over other approaches. Thus, the DWOML-RWD approach can be utilized for ransomware detection in a real-time IoT-cloud environment. In the future, the DWOML-RWD model can be extended to the integration of hybrid deep learning models.

Author Contributions

Conceptualization, K.A.A. and D.H.E.; methodology, K.T.; software, A.Y.; validation, R.A., O.A. and A.M.; formal analysis, A.Y.; investigation, K.T.; resources, M.A.D.; data curation, O.A.; writing—original draft preparation, K.A.A., D.H.E. and K.T.; writing—review and editing, A.M., A.Y., O.A.; visualization, R.A.; supervision, K.A.A.; project administration, M.A.D.; funding acquisition, D.H.E. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R238), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work (Grant Code: 22UQU4331004DSR03).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing does not apply to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Fernando, D.W.; Komninos, N.; Chen, T. A study on the evolution of ransomware detection using machine learning and deep learning techniques. IoT 2020, 1, 551–604. [Google Scholar] [CrossRef]
  2. Urooj, U.; Al-rimy, B.A.S.; Zainal, A.; Ghaleb, F.A.; Rassam, M.A. Ransomware detection using the dynamic analysis and machine learning: A survey and research directions. Appl. Sci. 2021, 12, 172. [Google Scholar] [CrossRef]
  3. Hirano, M.; Hodota, R.; Kobayashi, R. RanSAP: An open dataset of ransomware storage access patterns for training machine learning models. Forensic Sci. Int. Digit. Investig. 2022, 40, 301314. [Google Scholar] [CrossRef]
  4. Usharani, S.; Bala, P.M.; Mary, M.M.J. Dynamic analysis on crypto-ransomware by using machine learning: Gandcrab ransomware. J. Phys. Conf. Ser. 2021, 1717, 012024. [Google Scholar] [CrossRef]
  5. Humayun, M.; Jhanjhi, N.Z.; Alsayat, A.; Ponnusamy, V. Internet of things and ransomware: Evolution, mitigation and prevention. Egypt. Inform. J. 2021, 22, 105–117. [Google Scholar] [CrossRef]
  6. Bello, I.; Chiroma, H.; Abdullahi, U.A.; Gital, A.Y.U.; Jauro, F.; Khan, A.; Okesola, J.O.; Abdulhamid, S.I.M. Detecting ransomware attacks using intelligent algorithms: Recent development and next direction from deep learning and big data perspectives. J. Ambient Intell. Humaniz. Comput. 2021, 12, 8699–8717. [Google Scholar] [CrossRef]
  7. Jahromi, A.N.; Hashemi, S.; Dehghantanha, A.; Choo, K.K.R.; Karimipour, H.; Newton, D.E.; Parizi, R.M. An improved two-hidden-layer extreme learning machine for malware hunting. Comput. Secur. 2020, 89, 101655. [Google Scholar] [CrossRef]
  8. Alzahrani, N.; Alghazzawi, D. November. A review on android ransomware detection using deep learning techniques. In Proceedings of the 11th International Conference on Management of Digital EcoSystems, Limassol, Cyprus, 12–14 November 2019; pp. 330–335. [Google Scholar]
  9. Basnet, M.; Poudyal, S.; Ali, M.H.; Dasgupta, D. Ransomware detection using deep learning in the SCADA system of electric vehicle charging station. In Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), Lima, Peru, 15–17 September 2021; pp. 1–5. [Google Scholar]
  10. Ashraf, A.; Aziz, A.; Zahoora, U.; Rajarajan, M.; Khan, A. Ransomware analysis using feature engineering and deep neural networks. arXiv 2019, arXiv:1910.00286. [Google Scholar]
  11. Al-Hawawreh, M.; Sitnikova, E. Leveraging deep learning models for ransomware detection in the industrial internet of things environment. In Proceedings of the 2019 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 12–14 November 2019; pp. 1–6. [Google Scholar]
  12. Aurangzeb, S.; Anwar, H.; Naeem, M.A.; Aleem, M. BigRC-EML: Big-data based ransomware classification using ensemble machine learning. Clust. Comput. 2022, 25, 3405–3422. [Google Scholar] [CrossRef]
  13. Masum, M.; Faruk, M.J.H.; Shahriar, H.; Qian, K.; Lo, D.; Adnan, M.I. Ransomware classification and detection with machine learning algorithms. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 26–29 January 2022; pp. 0316–0322. [Google Scholar]
  14. Ogundokun, R.O.; Awotunde, J.B.; Misra, S.; Abikoye, O.C.; Folarin, O. Application of machine learning for ransomware detection in IoT devices. In Artificial Intelligence for Cyber Security: Methods 2021, Issues and Possible Horizons or Opportunities; Springer: Cham, Switzerland, 2021; pp. 393–420. [Google Scholar]
  15. Ahmed, Y.A.; Huda, S.; Al-rimy, B.A.S.; Alharbi, N.; Saeed, F.; Ghaleb, F.A.; Ali, I.M. A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT. Sustainability 2022, 14, 1231. [Google Scholar] [CrossRef]
  16. Du, J.; Raza, S.H.; Ahmad, M.; Alam, I.; Dar, S.H.; Habib, M.A. Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data Protection. Secur. Commun. Netw. 2022, 2022, 1424638. [Google Scholar] [CrossRef]
  17. Al-Hawawreh, M.; Sitnikova, E. Industrial Internet of Things based ransomware detection using stacked variational neural network. In Proceedings of the 3rd International Conference on Big Data and Internet of Things, Melbourn, Australia, 22–24 August 2019; pp. 126–130. [Google Scholar]
  18. Muthu, B.; Cb, S.; Kumar, P.M.; Kadry, S.N.; Hsu, C.H.; Sanjuan, O.; Crespo, R.G. A framework for extractive text summarization based on deep learning modified neural network classifier. Trans. Asian Low-Resour. Lang. Inf. Processing 2021, 20, 1–20. [Google Scholar] [CrossRef]
  19. Prakash, V.S.; Vinothina, V.; Kalaiselvi, K.; Velusamy, K. An improved bacterial colony optimization using opposition-based learning for data clustering. Clust. Comput. 2022, 1–17. [Google Scholar] [CrossRef]
  20. Li, L.L.; Liu, Z.F.; Tseng, M.L.; Jantarakolica, K.; Lim, M.K. Using enhanced crow search algorithm optimization-extreme learning machine model to forecast short-term wind power. Expert Syst. Appl. 2021, 184, 115579. [Google Scholar] [CrossRef]
  21. Agushaka, J.O.; Ezugwu, A.E.; Abualigah, L. Dwarf mongoose optimization algorithm. Comput. Methods Appl. Mech. Eng. 2022, 391, 114570. [Google Scholar] [CrossRef]
  22. Khammas, B.M. Ransomware detection using random forest technique. ICT Express 2020, 6, 325–331. [Google Scholar] [CrossRef]
Figure 1. Block diagram of DWOML-RWD approach.
Figure 1. Block diagram of DWOML-RWD approach.
Applsci 12 09513 g001
Figure 2. Architecture of ELM.
Figure 2. Architecture of ELM.
Applsci 12 09513 g002
Figure 3. Confusion matrices of DWOML-RWD approach: (a) run-1, (b) run-2, (c) run-3, (d) run-4, and (e) run-5.
Figure 3. Confusion matrices of DWOML-RWD approach: (a) run-1, (b) run-2, (c) run-3, (d) run-4, and (e) run-5.
Applsci 12 09513 g003
Figure 4. Average analysis of DWOML-RWD approach with distinct measures.
Figure 4. Average analysis of DWOML-RWD approach with distinct measures.
Applsci 12 09513 g004
Figure 5. Average FNR and FPR analysis of DWOML-RWD approach with distinct runs.
Figure 5. Average FNR and FPR analysis of DWOML-RWD approach with distinct runs.
Applsci 12 09513 g005
Figure 6. TRA and VLA analysis of DWOML-RWD approach.
Figure 6. TRA and VLA analysis of DWOML-RWD approach.
Applsci 12 09513 g006
Figure 7. TRL and VLL analysis of DWOML-RWD approach.
Figure 7. TRL and VLL analysis of DWOML-RWD approach.
Applsci 12 09513 g007
Figure 8. Precision–recall analysis of DWOML-RWD approach.
Figure 8. Precision–recall analysis of DWOML-RWD approach.
Applsci 12 09513 g008
Figure 9. ROC curve analysis of DWOML-RWD approach.
Figure 9. ROC curve analysis of DWOML-RWD approach.
Applsci 12 09513 g009
Figure 10. S e n s y and S p e c y analysis of DWOML-RWD approach with existing algorithms. Based on s p e c y , the DWOML-RWD method gained enhanced s p e c y of 99.40%, whereas the Adaboost-M1, bagging, ROF, RF, and DT algorithms resulted in lower s p e c y values of 95%, 96.50%, 97.40%, 98.70%, and 98.51%, respectively.
Figure 10. S e n s y and S p e c y analysis of DWOML-RWD approach with existing algorithms. Based on s p e c y , the DWOML-RWD method gained enhanced s p e c y of 99.40%, whereas the Adaboost-M1, bagging, ROF, RF, and DT algorithms resulted in lower s p e c y values of 95%, 96.50%, 97.40%, 98.70%, and 98.51%, respectively.
Applsci 12 09513 g010
Figure 11. FNR and FPR analysis of DWOML-RWD approach with existing algorithms.
Figure 11. FNR and FPR analysis of DWOML-RWD approach with existing algorithms.
Applsci 12 09513 g010
Table 1. Dataset details.
Table 1. Dataset details.
ClassNo. of Samples
Goodware420
Ransomware420
Total Number of Samples840
Table 2. Result analysis of DWOML-RWD technique with distinct measures and runs.
Table 2. Result analysis of DWOML-RWD technique with distinct measures and runs.
Class LabelsAccuracySensitivitySpecificityF-ScoreFNRFPR
Run-1
Goodware98.6998.1099.2998.6801.9000.71
Ransomware98.6999.2998.1098.7000.7101.90
Average98.6998.6998.6998.6901.3101.31
Run-2
Goodware98.6998.3399.0598.6901.6700.95
Ransomware98.6999.0598.3398.7000.9501.67
Average98.6998.6998.6998.6901.3101.31
Run-3
Goodware99.1798.8199.5299.1601.1900.48
Ransomware99.1799.5298.8199.1700.4801.19
Average99.1799.1799.1799.1700.8300.83
Run-4
Goodware99.0598.5799.5299.0401.4300.48
Ransomware99.0599.5298.5799.0500.4801.43
Average99.0599.0599.0599.0500.9500.95
Run-5
Goodware99.4099.0599.7699.4000.9500.24
Ransomware99.4099.7699.0599.4100.2400.95
Average99.4099.4099.4099.4000.6000.60
Table 3. Comparative analysis of DWOML-RWD technique with existing algorithms.
Table 3. Comparative analysis of DWOML-RWD technique with existing algorithms.
MethodsAccuracySensitivitySpecificityFNRFPR
DWOML-RWD99.4099.4099.400.600.60
AdaBoost-M196.1394.6095.005.405.00
Bagging99.0093.8096.506.203.50
Rotation Forest96.2496.9097.403.102.60
Random Forest98.8199.2198.700.791.30
Decision Tree97.6898.1298.511.881.49
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

A. Alissa, K.; H. Elkamchouchi, D.; Tarmissi, K.; Yafoz, A.; Alsini, R.; Alghushairy, O.; Mohamed, A.; Al Duhayyim, M. Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment. Appl. Sci. 2022, 12, 9513. https://doi.org/10.3390/app12199513

AMA Style

A. Alissa K, H. Elkamchouchi D, Tarmissi K, Yafoz A, Alsini R, Alghushairy O, Mohamed A, Al Duhayyim M. Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment. Applied Sciences. 2022; 12(19):9513. https://doi.org/10.3390/app12199513

Chicago/Turabian Style

A. Alissa, Khalid, Dalia H. Elkamchouchi, Khaled Tarmissi, Ayman Yafoz, Raed Alsini, Omar Alghushairy, Abdullah Mohamed, and Mesfer Al Duhayyim. 2022. "Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment" Applied Sciences 12, no. 19: 9513. https://doi.org/10.3390/app12199513

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop