• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用混合加密技术的深度学习模型预测安卓勒索软件

Prediction of android ransomware with deep learning model using hybrid cryptography.

作者信息

Kalphana K R, Aanjankumar S, Surya M, Ramadevi M S, Ramela K R, Anitha T, Nagaprasad N, Krishnaraj Ramaswamy

机构信息

Department of Agricultural Engineering, Mahendra Engineering College, Namakkal, Tamil Nadu, 637503, India.

School of Computing Science and Engineering (SCOPE), VIT Bhopal University, Bhopal-Indore Highway, Kothrikalan, Sehore, Madhya Pradesh, 466114, India.

出版信息

Sci Rep. 2024 Sep 27;14(1):22351. doi: 10.1038/s41598-024-70544-x.

DOI:10.1038/s41598-024-70544-x
PMID:39333540
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11437110/
Abstract

In recent times, the number of malware on Android mobile phones has been growing, and a new kind of malware is Android ransomware. This research aims to address the emerging concerns about Android ransomware in the mobile sector. Previous studies highlight that the number of new Android ransomware is increasing annually, which poses a huge threat to the privacy of mobile phone users for sensitive data. Various existing techniques are active to detect ransomware and secure the data in the mobile cloud. However, these approaches lack accuracy and detection performance with insecure storage. To resolve this and enhance the security level, the proposed model is presented. This manuscript provides both recognition algorithms based on the deep learning model and secured storage of detected data in the cloud with a secret key to safeguard sensitive user information using the hybrid cryptographic model. Initially, the input APK files and data are preprocessed to extract features. The collection of optimal features is carried out using the Squirrel search optimization process. After that, the Deep Learning-based model, adaptive deep saliency The AlexNet classifier is presented to detect and classify data as malicious or normal. The detected data, which is not malicious, is stored on a cloud server. For secured storage of data in the cloud, a hybrid cryptographic model such as hybrid homomorphic Elliptic Curve Cryptography and Blowfish is employed, which includes key computation and key generation processes. The cryptographic scheme includes encryption and decryption of data, after which the application response is found to attain a decrypted result upon user request. The performance is carried out for both the Deep Learning-based model and the hybrid cryptography-based security model, and the results obtained are 99.89% accuracy in detecting malware compared with traditional models. The effectiveness of the proposed system over other models such as GNN is 94.76%, CNN is 95.76%, and Random Forest is 96%.

摘要

近年来,安卓手机上的恶意软件数量一直在增长,一种新型恶意软件是安卓勒索软件。本研究旨在解决移动领域中对安卓勒索软件新出现的担忧。先前的研究强调,新的安卓勒索软件数量每年都在增加,这对手机用户敏感数据的隐私构成了巨大威胁。各种现有技术积极用于检测勒索软件并保护移动云中的数据。然而,这些方法在存储不安全的情况下缺乏准确性和检测性能。为了解决这个问题并提高安全级别,提出了所建议的模型。本手稿既提供了基于深度学习模型的识别算法,又使用混合加密模型将检测到的数据安全存储在云中,并使用密钥来保护用户敏感信息。最初,对输入的APK文件和数据进行预处理以提取特征。使用松鼠搜索优化过程进行最优特征的收集。之后,提出基于深度学习的模型——自适应深度显著性AlexNet分类器,以检测和分类数据是恶意还是正常。检测到的非恶意数据存储在云服务器上。为了在云中安全存储数据,采用了混合同态椭圆曲线密码术和 Blowfish 等混合加密模型,其中包括密钥计算和密钥生成过程。加密方案包括数据的加密和解密,之后在用户请求时找到应用响应以获得解密结果。对基于深度学习的模型和基于混合密码学的安全模型都进行了性能测试,与传统模型相比,检测恶意软件的准确率达到了99.89%。所建议的系统相对于其他模型,如GNN的有效性为94.76%,CNN为95.76%,随机森林为96%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/6138a73e604e/41598_2024_70544_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/b92ab25eda10/41598_2024_70544_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/e8278c035a11/41598_2024_70544_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/f0e2d35dc0fb/41598_2024_70544_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/1157b021cec6/41598_2024_70544_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/789c62729abd/41598_2024_70544_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/35b322a4e49e/41598_2024_70544_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/238edd667687/41598_2024_70544_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/a2584a23602c/41598_2024_70544_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/df2cc4787a2b/41598_2024_70544_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/901bd9060f63/41598_2024_70544_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/babc4f5f4a5b/41598_2024_70544_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/6138a73e604e/41598_2024_70544_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/b92ab25eda10/41598_2024_70544_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/e8278c035a11/41598_2024_70544_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/f0e2d35dc0fb/41598_2024_70544_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/1157b021cec6/41598_2024_70544_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/789c62729abd/41598_2024_70544_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/35b322a4e49e/41598_2024_70544_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/238edd667687/41598_2024_70544_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/a2584a23602c/41598_2024_70544_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/df2cc4787a2b/41598_2024_70544_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/901bd9060f63/41598_2024_70544_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/babc4f5f4a5b/41598_2024_70544_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df67/11437110/6138a73e604e/41598_2024_70544_Fig9_HTML.jpg

相似文献

1
Prediction of android ransomware with deep learning model using hybrid cryptography.使用混合加密技术的深度学习模型预测安卓勒索软件
Sci Rep. 2024 Sep 27;14(1):22351. doi: 10.1038/s41598-024-70544-x.
2
Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.基于流量分析的监督式机器学习技术在安卓勒索软件检测中的应用
Sensors (Basel). 2023 Dec 28;24(1):189. doi: 10.3390/s24010189.
3
Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.时间数据相关性提供增强的动态加密勒索软件预加密边界划定。
Sensors (Basel). 2023 Apr 28;23(9):4355. doi: 10.3390/s23094355.
4
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.E2E-RDS:基于静态 ML 和基于视觉的 DL 方法的高效端到端勒索软件检测系统。
Sensors (Basel). 2023 May 4;23(9):4467. doi: 10.3390/s23094467.
5
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.一种用于在安卓物联网设备的高效视频编码(HEVC)流中隐藏勒索软件的加密隐写术方法。
Sensors (Basel). 2022 Mar 16;22(6):2281. doi: 10.3390/s22062281.
6
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
7
FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification.FedHGCDroid:用于保护隐私的安卓恶意软件分类的自适应多维联邦学习
Entropy (Basel). 2022 Jul 1;24(7):919. doi: 10.3390/e24070919.
8
A detection method for android application security based on TF-IDF and machine learning.基于 TF-IDF 和机器学习的安卓应用安全检测方法。
PLoS One. 2020 Sep 11;15(9):e0238694. doi: 10.1371/journal.pone.0238694. eCollection 2020.
9
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.
10
Deep Feature Extraction and Classification of Android Malware Images.安卓恶意软件图像的深度特征提取与分类。
Sensors (Basel). 2020 Dec 8;20(24):7013. doi: 10.3390/s20247013.

引用本文的文献

1
Secure IoV communications for smart fleet systems empowered with ASCON.借助ASCON实现智能车队系统的安全车联网通信。
Sci Rep. 2025 May 30;15(1):19103. doi: 10.1038/s41598-025-04061-w.

本文引用的文献

1
A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm.一种使用改进鲸鱼优化算法的用于网络攻击检测的新型优化神经网络模型。
Sci Rep. 2024 Mar 7;14(1):5590. doi: 10.1038/s41598-024-55098-2.
2
A robust and lightweight secure access scheme for cloud based E-healthcare services.一种用于基于云的电子医疗保健服务的健壮且轻量级的安全访问方案。
Peer Peer Netw Appl. 2021;14(5):3043-3057. doi: 10.1007/s12083-021-01162-x. Epub 2021 May 3.