965
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Article: 2233716 | Received 12 Mar 2023, Accepted 01 Jul 2023, Published online: 22 Jul 2023

References

  • Abbasi, M. S., Al-Sahaf, H., Mansoori, M., & Welch, I. (2022). Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection. Applied Soft Computing, 121, 1–12. https://doi.org/10.1016/j.asoc.2022.108744
  • Alqahtani, A., & Sheldon, F. T. (2022). A survey of crypto ransomware attack detection methodologies: An evolving outlook. IEEE Sensors Journal, 22(24), C1–C1. https://doi.org/10.1109/JSEN.2022.3226932
  • Al-rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2019). Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Generation Computer Systems, 101, 476–491. https://doi.org/10.1016/j.future.2019.06.005
  • Alshammari, H., El-Ghany, S. A., & Shehab, A. (2020). Big IoT healthcare data analytics framework based on fog and cloud computing. Journal of Information Processing Systems, 16(6), 1238–1249. https://doi.org/10.3745/JIPS.04.0193
  • Amer, E., & Zelinka, I. (2020). A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence. Computers & Security, 92, 101760–15. https://doi.org/10.1016/j.cose.2020.101760
  • Baek, S., Jeon, J., Jeong, B., & Jeong, Y. S. (2021). Two-stage hybrid malware detection using deep learning. Human-centric Computing and Information Sciences, 11(27), 1–14. https://doi.org/10.22967/HCIS.2021.11.027
  • Bai, S., Kolter, J. Z., & Koltun, V. (2018). An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271. https://doi.org/10.48550/arXiv.1803.01271.
  • Balram, N., Hsieh, G., & McFall, C. (2019). Static malware analysis using machine learning algorithms on APT1 dataset with string and PE header features. 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 90–95. https://doi.org/10.1109/CSCI49370.2019
  • Bojanowski, P., Grave, E., Joulin, A., & Mikolov, T. (2017). Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics, 5, 135–146. https://doi.org/10.1162/tacl_a_00051
  • Connolly, A. Y., & Borrion, H. (2022). Reducing ransomware crime: Analysis of victims’ payment decisions. Computers & Security, 119, 1–14. https://doi.org/10.1016/j.cose.2022.102760
  • D’Angelo, G., Ficco, M., & Palmieri, F. (2021). Association rule-based malware classification using common subsequences of API calls. Applied Soft Computing, 105, 1–9. https://doi.org/10.1016/j.asoc.2021.107234
  • Ding, C., Luktarhan, N., Lu, B., & Zhang, W. (2021). A hybrid analysis-based approach to Android malware family classification. Entropy, 23(8), 1–23. https://doi.org/10.3390/e23081009
  • Gogineni, K., Darasari, P., & Venkataramani, G. (2022). Foreseer: Efficiently forecasting malware event series with long short-term memory. 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 97–108. https://doi.org/10.1109/SEED55351.2022.00016
  • He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. Journal of Medical Internet Research, 23(4), e21747. https://doi.org/10.2196/21747
  • Hussain, A., Ali, T., Althoniani, F., Draz, U., Irfan, M., Yasin, S., Shafiq, S., Safdar, Z., Glowacz, A., Nowakowski, G., Khan, M. S., & Alqahtani, S. (2021). Security framework for IoT based real-time health applications. Electronics, 10(6), 719. https://doi.org/10.3390/electronics10060719
  • Ibrahim, M., Issa, B., & Jasser, M. B. (2022). A method for automatic android malware detection based on static analysis and deep learning. IEEE Access, 10, 117334–117352. https://doi.org/10.1109/ACCESS.2022.3219047
  • Jeon, J., Jeong, B., Baek, S., & Jeong, Y. S. (2022). Hybrid malware detection based on Bi-LSTM and SPP-Net for smart IoT. IEEE Transactions on Industrial Informatics, 18(7), 4830–4837. https://doi.org/10.1109/TII.2021.3119778
  • Jeong, B., Baek, S., Park, S., Jeon, J., & Jeong, Y. S. (2023). Stable and efficient resource management using deep neural network on cloud computing. Neurocomputing, 521, 99–112. https://doi.org/10.1016/j.neucom.2022.11.089
  • Kakisim, A. G., Gulmez, S., & Sogukpinar, I. (2022). Sequential opcode embedding-based malware detection method. Computers & Electrical Engineering, 98, 107703. https://doi.org/10.1016/j.compeleceng.2022.107703
  • Kara, I., & Aydos, M. (2021). The rise of ransomware: Forensic analysis for windows based ransomware attacks. Expert Systems with Applications, 190, 1–14. https://doi.org/10.1016/j.eswa.2021.116198
  • Lea, C., Flynn, M. D., Vidal, R., Reiter, A., & Hager, G. D. (2017). Temporal convolutional networks for action segmentation and detection. Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), Honolulu, Hawaii, 156–165. https://doi.org/10.48550/arXiv.1611.05267
  • Liu, M., Zeng, A., Chen, M., Xu, Z., Lai, Q., Ma, L., & Xu, Q. (2021). SCINet: Time series modeling and forecasting with sample convolution and interaction. arXiv preprint arXiv:2106.09305. https://doi.org/10.48550/arXiv.2106.09305.
  • Manikandan, R., Indu., Albuquerque, V. H. C., Tiwari, P., AlQahtani, S. A., & Hossain, M. S. (2022). Quality of service-aware resource selection in healthcare IoT using deep autoencoder neural networks. Human-centric Computing and Information Sciences, 12, 1–16. https://doi.org/10.22967/HCIS.2022.12.036
  • McIntosh, T., Kayes, A. S. M., Chen, Y. P. P., Ng, A., & Watters, P. (2021). Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions. ACM Computing Surveys, 54(9), 1–36. https://doi.org/10.1145/3479393
  • Molina, R. M. A., Torabi, S., Sarieddine, K., Bou-Harb, E., Bouguila, N., & Assi, C. (2022). On ransomware family attribution using pre-attack paranoia activities. IEEE Transactions on Network and Service Management, 19(1), 19–36. https://doi.org/10.1109/TNSM.2021.3112056
  • Oz, H., Aris, A., Levi, A., & Uluagac, A. S. (2022). A survey on ransomware: Evolution, taxonomy, and defense solutions. ACM Computing Surveys, 54(11s), 1–37. https://doi.org/10.1145/3514229
  • Poudyal, S., & Dasgupta, D. (2021). Analysis of crypto-ransomware using ML-based multi-level profiling. IEEE Access, 9, 122532–122547. https://doi.org/10.1109/ACCESS.2021.3109260
  • Rhode, M., Burnap, P., & Jones, K. (2018). Early-stage malware prediction using recurrent neural networks. Computers & Security, 77, 578–594. https://doi.org/10.1016/j.cose.2018.05.010
  • Ryan, P., Fokker, J., Healy, S., & Amann, A. (2022). Dynamics of targeted ransomware negotiation. IEEE Access, 10, 32836–32844. https://doi.org/10.1109/ACCESS.2022.3160748
  • Said, O. (2022). LBSS: A lightweight blockchain-based security scheme for IoT-enabled healthcare environment. Sensors, 22(20), 7948–7920. https://doi.org/10.3390/s22207948
  • Sharmeen, S., Ahmed, Y. A., Huda, S., Koçer, B. S., & Hassan, M. M. (2020). Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches. IEEE Access, 8, 24522–24534. https://doi.org/10.1109/ACCESS.2020.2970466
  • Tariq, U., Ullah, I., Uddin, M. Y., & Kwon, S. J. (2022). An effective self-configurable ransomware prevention technique for IoMT. Sensors, 22, 1–18. https://doi.org/10.1109/JSEN.2022.3226932
  • Wazid, M., Das, A. K., & Shetty, S. (2023). BSFR-SH: Blockchain-enabled Security Framework against Ransomware attacks for Smart Healthcare. IEEE Transactions on Consumer Electronics, 69(1), 18–28. https://doi.org/10.1109/TCE.2022.3208795
  • Zeng, A., Chen, M., Zhang, L., & Xu, Q. (2022). Are transformers effective for time series forecasting? arXiv preprint arXiv:2205.13504. https://doi.org/10.48550/arXiv.2205.13504.
  • Zhou, H., Zhang, S., Peng, J., Zhang, S., Li, J., Xiong, H., & Zhang, W. (2021). Informer: Beyond efficient transformer for long sequence time-series forecasting. Proceedings of the AAAI Conference on Artificial Intelligence, 35(12), 11106–11115. https://doi.org/10.1609/aaai.v35i12.17325