Nalinipriya, Ganapathi and Balajee, Maram and Priya, Chittibabu and Rajan, Cristin (2022) Ransomware recognition in blockchain network using water moth flame optimization‐aware DRNN. Concurrency and Computation: Practice and Experience, 34 (19). ISSN 1532-0626
Full text not available from this repository. (Request a copy)Abstract
Ransomware recognition in blockchain network using water moth flame optimization‐aware DRNN Ganapathi Nalinipriya Department of Information Technology Saveetha Engineering College Chennai Thandalam Tamil Nadu India https://orcid.org/0000-0001-9330-9231 Maram Balajee Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Chitkara University Himachal Pradesh India Chittibabu Priya Department of Information Technology Vels Institute of Science, Technology and Advanced Studies Chennai Pallavaram Tamil Nadu India Cristin Rajan Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Chitkara University Himachal Pradesh India Department of Computer Science and Engineering GMR Institute of Technology Razam Andhra Pradesh India Abstract
The emergence of networking systems and quick deployment of applications cause huge increase in cybercrimes which involves various applications like phishing, hacking, and malware propagation. However, the Ransomware techniques utilize certain device which may lead to undesirable properties which might shrink the paying‐victim pool. This paper devises a new method, namely Water Moth Flame optimization (WMFO) and deep recurrent neural network (Deep RNN) for determining Ransomware. Here, Deep RNN training is done with WMFO, and is developed by combining Moth Flame optimization (MFO) and Water wave optimization (WWO). Moreover, features are mined with opcodes and by finding term frequency‐inverse document frequency (TF‐IDF) amongst individual features. Moreover, Probabilistic Principal Component Analysis (PPCA) is adapted to choose significant features. These features are adapted in Deep RNN for classification, wherein the proposed WMFO is employed to produce optimum weights. The WMFO offered enhanced performance with elevated accuracy of 95.025%, sensitivity of 95%, and specificity of 96%.
   06 03 2022   08 30 2022   e7047 10.1002/cpe.7047   2 10.1002/crossmark_policy   onlinelibrary.wiley.com   true  2021-12-08 2022-04-20 2022-06-03  http://onlinelibrary.wiley.com/termsAndConditions#vor        10.1002/cpe.7047 https://onlinelibrary.wiley.com/doi/10.1002/cpe.7047   https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.7047     https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.7047   https://onlinelibrary.wiley.com/doi/full-xml/10.1002/cpe.7047      10.1109/ICICCS51141.2021.9432224   Multimed Res Jadhav AN 1 2 3 2019 DIGWO: hybridization of dragonfly algorithm with improved grey wolf optimization algorithm for data clustering   Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS) Fuji R 13 2019   Bitcoin: A Peer‐to‐Peer Electronic Cash System Nakamoto S 2019   10.23919/CYCON.2018.8405028   10.46253/jcmps.v2i3.a2   10.1109/ACCESS.2018.2805783   Int J Intell Eng Syst Polepally V 67 10 5 2017 Multiple objective–based modified exponential gravitational search algorithm to VMM strategy for load balancing in cloud   10.1109/JIOT.2020.2977196   10.3390/s20020539   10.1260/1369-4332.13.2.339   10.1016/j.advengsoft.2008.11.008   Int J Adv Res Comput Sci Sultan H 9 2 2018 A survey on ransomeware: evolution, growth, and impact   10.1109/ICICCS51141.2021.9432241   IEEE Trans Ind Inf Medhane D 2019 Energy‐aware green adversary model for cyber physical security in industrial system   10.1016/j.compeleceng.2019.07.014   J Netw Commun Syst Chandanapalli SB 40 2 3 2019 Convolutional neural network for water quality prediction in WSN   10.1109/TII.2019.2898174   BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain Akcora CG 4439 2019   10.1016/j.compstruc.2020.106250   ASCE‐ASME J Risk Uncertain Eng Syst Pt A Gholizadeh S 1 3 1 2017 Reliability‐based seismic optimization of steel frames by metaheuristics and neural networks   10.12989/scs.2017.24.1.129   10.1109/SP.2018.00047   10.1109/IKT.2013.6620049   Proceedings of International Conference on Network‐based Information Systems Fuji R 305 2019   10.1016/j.jnca.2018.09.013   10.1007/s00500-018-3257-z   10.1109/ACCESS.2018.2884964   10.1016/j.future.2019.09.025   10.3390/info11010051   IJoFCS Poudyal S 34 1 2019 PEFile analysis: a static approach to ransomware analysis   Comput Inf Sci Thomas JE 72 12 3 2019 Enterprise cyber security: investigating and detecting ransomware infections using digital forensic techniques   10.1007/s10015-017-0422-x   10.1111/1467-9868.00196   10.1016/j.cor.2014.10.008   10.1016/j.knosys.2015.07.006   10.1155/2019/2674684   10.1109/NCM.2008.199   10.1016/j.physa.2017.04.113   Ransomware‐Detection‐Dataset taken fromhttps://cybersciencelab.org/ransomware‐detection‐dataset/. Accessed February2020.   Aktaion Example Labeled Data taken fromhttps://www.azsecure‐data.org/other‐data.html. Accessed February2020.
| Item Type: | Article | 
|---|---|
| Subjects: | Computer Science Engineering > Cloud Computing | 
| Domains: | Computer Applications | 
| Depositing User: | Mr IR Admin | 
| Date Deposited: | 12 Sep 2024 11:07 | 
| Last Modified: | 12 Sep 2024 11:07 | 
| URI: | https://ir.vistas.ac.in/id/eprint/5725 | 



 Dimensions
 Dimensions Dimensions
 Dimensions