• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

增强勒索软件防御:基于深度学习的不断演变威胁的检测与家族式分类

Enhancing ransomware defense: deep learning-based detection and family-wise classification of evolving threats.

作者信息

Hussain Amjad, Saadia Ayesha, Alhussein Musaed, Gul Ammara, Aurangzeb Khursheed

机构信息

Department of Cyber Security, Air University, Islamabad, Pakistan.

Department of Computer Science, Air University, Islamabad, Pakistan.

出版信息

PeerJ Comput Sci. 2024 Nov 29;10:e2546. doi: 10.7717/peerj-cs.2546. eCollection 2024.

DOI:10.7717/peerj-cs.2546
PMID:39678277
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11640932/
Abstract

Ransomware is a type of malware that locks access to or encrypts its victim's files for a ransom to be paid to get back locked or encrypted data. With the invention of obfuscation techniques, it became difficult to detect its new variants. Identifying the exact malware category and family can help to prepare for possible attacks. Traditional machine learning-based approaches failed to detect and classify advanced obfuscated ransomware variants using existing pattern-matching and signature-based detection techniques. Deep learning-based approaches have proven helpful in both detection and classification by analyzing obfuscated ransomware deeply. Researchers have contributed mainly to detection and minimaly to family attribution. This research aims to address all these multi-class classification problems by leveraging the power of deep learning. We have proposed a novel group normalization-based bidirectional long short-term memory (GN-BiLSTM) method to detect and classify ransomware variants with high accuracy. To validate the technique, five other deep learning models are also trained on the CIC-MalMem-2022, an obfuscated malware dataset. The proposed approach outperformed with an accuracy of 99.99% in detection, 85.48% in category-wise classification, and 74.65% in the identification of ransomware families. To verify its effectiveness, models are also trained on 10,876 self-collected latest samples of 26 malware families and the proposed model has achieved 99.20% accuracy in detecting malware, 97.44% in classifying its category, and 96.23% in identifying its family. Our proposed approach has proven the best for detecting new variants of ransomware with high accuracy and can be implemented in real-world applications of ransomware detection.

摘要

勒索软件是一种恶意软件,它会锁定对受害者文件的访问权限或对其进行加密,以索要赎金来恢复被锁定或加密的数据。随着混淆技术的发明,检测其新变种变得困难。识别确切的恶意软件类别和家族有助于为可能的攻击做好准备。基于传统机器学习的方法无法使用现有的模式匹配和基于签名的检测技术来检测和分类先进的混淆勒索软件变种。基于深度学习的方法已被证明通过深入分析混淆勒索软件在检测和分类方面都很有帮助。研究人员主要在检测方面做出了贡献,而在家族归属方面贡献较少。本研究旨在通过利用深度学习的力量来解决所有这些多类分类问题。我们提出了一种基于组归一化的新型双向长短期记忆(GN-BiLSTM)方法,以高精度检测和分类勒索软件变种。为了验证该技术,还在一个混淆恶意软件数据集CIC-MalMem-2022上训练了其他五个深度学习模型。所提出的方法在检测准确率方面达到了99.99%,在类别分类方面达到了85.48%,在勒索软件家族识别方面达到了74.65%,表现出色。为了验证其有效性,还在26个恶意软件家族的10,876个自收集的最新样本上训练了模型,所提出的模型在检测恶意软件方面达到了99.20%的准确率,在分类其类别方面达到了97.44%,在识别其家族方面达到了96.23%。我们提出的方法已被证明是检测勒索软件新变种的最佳方法,具有高精度,可应用于勒索软件检测的实际应用中。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/cea5f849cad0/peerj-cs-10-2546-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/6d56ae47bcf0/peerj-cs-10-2546-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/d18cc0c15b92/peerj-cs-10-2546-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/a04e60ced06a/peerj-cs-10-2546-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/ad958bff9af7/peerj-cs-10-2546-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/26ff8c35c114/peerj-cs-10-2546-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/418a25553fcc/peerj-cs-10-2546-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/417aeaa9fe25/peerj-cs-10-2546-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/bc3fbdb6440d/peerj-cs-10-2546-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/b089ca2ae7a3/peerj-cs-10-2546-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/56d1caebe50b/peerj-cs-10-2546-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/2ee5eff5cf3c/peerj-cs-10-2546-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/be16b7a2c283/peerj-cs-10-2546-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/cea5f849cad0/peerj-cs-10-2546-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/6d56ae47bcf0/peerj-cs-10-2546-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/d18cc0c15b92/peerj-cs-10-2546-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/a04e60ced06a/peerj-cs-10-2546-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/ad958bff9af7/peerj-cs-10-2546-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/26ff8c35c114/peerj-cs-10-2546-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/418a25553fcc/peerj-cs-10-2546-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/417aeaa9fe25/peerj-cs-10-2546-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/bc3fbdb6440d/peerj-cs-10-2546-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/b089ca2ae7a3/peerj-cs-10-2546-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/56d1caebe50b/peerj-cs-10-2546-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/2ee5eff5cf3c/peerj-cs-10-2546-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/be16b7a2c283/peerj-cs-10-2546-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7e9d/11640932/cea5f849cad0/peerj-cs-10-2546-g013.jpg

相似文献

1
Enhancing ransomware defense: deep learning-based detection and family-wise classification of evolving threats.增强勒索软件防御:基于深度学习的不断演变威胁的检测与家族式分类
PeerJ Comput Sci. 2024 Nov 29;10:e2546. doi: 10.7717/peerj-cs.2546. eCollection 2024.
2
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.E2E-RDS:基于静态 ML 和基于视觉的 DL 方法的高效端到端勒索软件检测系统。
Sensors (Basel). 2023 May 4;23(9):4467. doi: 10.3390/s23094467.
3
A Machine Learning-Based Ransomware Detection Method for Attackers' Neutralization Techniques Using Format-Preserving Encryption.一种基于机器学习的勒索软件检测方法,用于应对使用格式保留加密的攻击者中和技术。
Sensors (Basel). 2025 Apr 10;25(8):2406. doi: 10.3390/s25082406.
4
Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.基于流量分析的监督式机器学习技术在安卓勒索软件检测中的应用
Sensors (Basel). 2023 Dec 28;24(1):189. doi: 10.3390/s24010189.
5
Classification of ransomware using different types of neural networks.使用不同类型神经网络对勒索软件进行分类。
Sci Rep. 2022 Mar 19;12(1):4770. doi: 10.1038/s41598-022-08504-6.
6
Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms.使用机器学习算法的勒索软件检测动态特征数据集。
Sensors (Basel). 2023 Jan 17;23(3):1053. doi: 10.3390/s23031053.
7
On the classification of Microsoft-Windows ransomware using hardware profile.基于硬件配置文件对微软Windows勒索软件进行分类
PeerJ Comput Sci. 2021 Feb 2;7:e361. doi: 10.7717/peerj-cs.361. eCollection 2021.
8
Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications.面向智慧城市应用的资源受限物联网设备中的模糊内存恶意软件检测
Sensors (Basel). 2023 Jun 5;23(11):5348. doi: 10.3390/s23115348.
9
An Effective Self-Configurable Ransomware Prevention Technique for IoMT.一种用于 IoMT 的有效自配置勒索软件预防技术。
Sensors (Basel). 2022 Nov 4;22(21):8516. doi: 10.3390/s22218516.
10
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.

本文引用的文献

1
Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications.面向智慧城市应用的资源受限物联网设备中的模糊内存恶意软件检测
Sensors (Basel). 2023 Jun 5;23(11):5348. doi: 10.3390/s23115348.
2
Unsupervised and semi-supervised learning: the next frontier in machine learning for plant systems biology.无监督和半监督学习:植物系统生物学机器学习的下一个前沿。
Plant J. 2022 Sep;111(6):1527-1538. doi: 10.1111/tpj.15905. Epub 2022 Jul 27.
3
An ensemble method to forecast 24-h ahead solar irradiance using wavelet decomposition and BiLSTM deep learning network.
一种使用小波分解和双向长短期记忆(BiLSTM)深度学习网络预测提前24小时太阳辐照度的集成方法。
Earth Sci Inform. 2022;15(1):291-306. doi: 10.1007/s12145-021-00723-1. Epub 2021 Nov 17.
4
Ransomware: Recent advances, analysis, challenges and future research directions.勒索软件:最新进展、分析、挑战及未来研究方向
Comput Secur. 2021 Dec;111:102490. doi: 10.1016/j.cose.2021.102490. Epub 2021 Sep 24.