Affiliation:
1. Department of Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
Abstract
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim’s machine or encrypts his personal information. Numerous research has been conducted to stop and quickly recognize ransomware attacks. For proactive forecasting, artificial intelligence (AI) techniques are used. Traditional machine learning/deep learning (ML/DL) techniques, however, take a lot of time and decrease the accuracy and latency performance of network monitoring. In this study, we utilized the Hoeffding trees classifier as one of the stream data mining classification techniques to detect and prevent ransomware attacks. Three Hoeffding trees classifier algorithms are selected to be applied to the Resilient Information Systems Security (RISS) research group dataset. After configuration, Massive Online Analysis (MOA) software is utilized as a testing framework. The results of Hoeffding tree classifier algorithms are then assessed to choose the enhanced model with the highest accuracy and latency performance. In conclusion, the 99.41% classification accuracy was the highest result achieved by the EFDT algorithm in 66 ms.
Subject
Computer Networks and Communications,Human-Computer Interaction
Reference25 articles.
1. Early Detection of Crypto-Ransomware Using Pre-Encryption Detection Algorithm;Kok;J. King Saud Univ. Comput. Inf. Sci.,2020
2. Deep Learning for Proactive Network Monitoring and Security Protection;Nguyen;IEEE Access,2020
3. AbdulsalamYa’u, G., Job, G.K., Waziri, S.M., Jaafar, B., SabonGari, N.A., and Yakubu, I.Z. (2019, January 13–14). Deep Learning for Detecting Ransomware in Edge Computing Devices Based on Autoencoder Classifier. Proceedings of the 2019 4th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), Mysuru, India.
4. A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems;Hindy;IEEE Access,2020
5. Hulten, G., Domingos, P., and Spencer, L. (2005). Mining Massive Data Streams, ProQuest Information and Learning Company.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献