Ransomware recognition in blockchain network using water moth flame optimization‐aware DRNN

Nalinipriya, Ganapathi and Balajee, Maram and Priya, Chittibabu and Rajan, Cristin (2022) Ransomware recognition in blockchain network using water moth flame optimization‐aware DRNN. Concurrency and Computation: Practice and Experience, 34 (19). ISSN 1532-0626

Full text not available from this repository. (Request a copy)

Abstract

Ransomware recognition in blockchain network using water moth flame optimization‐aware DRNN Ganapathi Nalinipriya Department of Information Technology Saveetha Engineering College Chennai Thandalam Tamil Nadu India https://orcid.org/0000-0001-9330-9231 Maram Balajee Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Chitkara University Himachal Pradesh India Chittibabu Priya Department of Information Technology Vels Institute of Science, Technology and Advanced Studies Chennai Pallavaram Tamil Nadu India Cristin Rajan Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Chitkara University Himachal Pradesh India Department of Computer Science and Engineering GMR Institute of Technology Razam Andhra Pradesh India Abstract

The emergence of networking systems and quick deployment of applications cause huge increase in cybercrimes which involves various applications like phishing, hacking, and malware propagation. However, the Ransomware techniques utilize certain device which may lead to undesirable properties which might shrink the paying‐victim pool. This paper devises a new method, namely Water Moth Flame optimization (WMFO) and deep recurrent neural network (Deep RNN) for determining Ransomware. Here, Deep RNN training is done with WMFO, and is developed by combining Moth Flame optimization (MFO) and Water wave optimization (WWO). Moreover, features are mined with opcodes and by finding term frequency‐inverse document frequency (TF‐IDF) amongst individual features. Moreover, Probabilistic Principal Component Analysis (PPCA) is adapted to choose significant features. These features are adapted in Deep RNN for classification, wherein the proposed WMFO is employed to produce optimum weights. The WMFO offered enhanced performance with elevated accuracy of 95.025%, sensitivity of 95%, and specificity of 96%.
06 03 2022 08 30 2022 e7047 10.1002/cpe.7047 2 10.1002/crossmark_policy onlinelibrary.wiley.com true 2021-12-08 2022-04-20 2022-06-03 http://onlinelibrary.wiley.com/termsAndConditions#vor 10.1002/cpe.7047 https://onlinelibrary.wiley.com/doi/10.1002/cpe.7047 https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.7047 https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.7047 https://onlinelibrary.wiley.com/doi/full-xml/10.1002/cpe.7047 10.1109/ICICCS51141.2021.9432224 Multimed Res Jadhav AN 1 2 3 2019 DIGWO: hybridization of dragonfly algorithm with improved grey wolf optimization algorithm for data clustering Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS) Fuji R 13 2019 Bitcoin: A Peer‐to‐Peer Electronic Cash System Nakamoto S 2019 10.23919/CYCON.2018.8405028 10.46253/jcmps.v2i3.a2 10.1109/ACCESS.2018.2805783 Int J Intell Eng Syst Polepally V 67 10 5 2017 Multiple objective–based modified exponential gravitational search algorithm to VMM strategy for load balancing in cloud 10.1109/JIOT.2020.2977196 10.3390/s20020539 10.1260/1369-4332.13.2.339 10.1016/j.advengsoft.2008.11.008 Int J Adv Res Comput Sci Sultan H 9 2 2018 A survey on ransomeware: evolution, growth, and impact 10.1109/ICICCS51141.2021.9432241 IEEE Trans Ind Inf Medhane D 2019 Energy‐aware green adversary model for cyber physical security in industrial system 10.1016/j.compeleceng.2019.07.014 J Netw Commun Syst Chandanapalli SB 40 2 3 2019 Convolutional neural network for water quality prediction in WSN 10.1109/TII.2019.2898174 BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain Akcora CG 4439 2019 10.1016/j.compstruc.2020.106250 ASCE‐ASME J Risk Uncertain Eng Syst Pt A Gholizadeh S 1 3 1 2017 Reliability‐based seismic optimization of steel frames by metaheuristics and neural networks 10.12989/scs.2017.24.1.129 10.1109/SP.2018.00047 10.1109/IKT.2013.6620049 Proceedings of International Conference on Network‐based Information Systems Fuji R 305 2019 10.1016/j.jnca.2018.09.013 10.1007/s00500-018-3257-z 10.1109/ACCESS.2018.2884964 10.1016/j.future.2019.09.025 10.3390/info11010051 IJoFCS Poudyal S 34 1 2019 PEFile analysis: a static approach to ransomware analysis Comput Inf Sci Thomas JE 72 12 3 2019 Enterprise cyber security: investigating and detecting ransomware infections using digital forensic techniques 10.1007/s10015-017-0422-x 10.1111/1467-9868.00196 10.1016/j.cor.2014.10.008 10.1016/j.knosys.2015.07.006 10.1155/2019/2674684 10.1109/NCM.2008.199 10.1016/j.physa.2017.04.113 Ransomware‐Detection‐Dataset taken fromhttps://cybersciencelab.org/ransomware‐detection‐dataset/. Accessed February2020. Aktaion Example Labeled Data taken fromhttps://www.azsecure‐data.org/other‐data.html. Accessed February2020.

Item Type: Article
Subjects: Computer Science Engineering > Cloud Computing
Divisions: Computer Applications
Depositing User: Mr IR Admin
Date Deposited: 12 Sep 2024 11:07
Last Modified: 12 Sep 2024 11:07
URI: https://ir.vistas.ac.in/id/eprint/5725

Actions (login required)

View Item
View Item