Search for collections on SIMAD Repository

A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT

Ahmed, Yahye Abukar and Al-rimy, Bander Ali Saleh (2022) A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT. Sustainability.

[thumbnail of sustainability-14-01231-v2.pdf] Text
sustainability-14-01231-v2.pdf - Published Version

Download (1MB)

Abstract

Ransomware attacks against Industrial Internet of Things (IIoT) have catastrophic consequences not only to the targeted infrastructure, but also the services provided to the public. By
encrypting the operational data, the ransomware attacks can disrupt the normal operations, which
represents a serious problem for industrial systems. Ransomware employs several avoidance techniques, such as packing, obfuscation, noise insertion, irrelevant and redundant system call injection,
to deceive the security measures and make both static and dynamic analysis more difficult. In this
paper, a Weighted minimum Redundancy maximum Relevance (WmRmR) technique was proposed
for better feature significance estimation in the data captured during the early stages of ransomware
attacks. The technique combines an enhanced mRMR (EmRmR) with the Term Frequency-Inverse
Document Frequency (TF-IDF) so that it can filter out the runtime noisy behavior based on the weights
calculated by the TF-IDF. The proposed technique has the capability to assess whether a feature in
the relevant set is important or not. It has low-dimensional complexity and a smaller number of
evaluations compared to the original mRmR method. The TF-IDF was used to evaluate the weights
of the features generated by the EmRmR algorithm. Then, an inclusive entropy-based refinement
method was used to decrease the size of the extracted data by identifying the system calls with
strong behavioral indication. After extensive experimentation, the proposed technique has shown
to be effective for ransomware early detection with low-complexity and few false-positive rates. To
evaluate the proposed technique, we compared it with existing behavioral detection methods.

Item Type: Article
Subjects: A General Works > AC Collections. Series. Collected works
Divisions: Faculty of Computing
Depositing User: Unnamed user with email crd@smiad.edu.so
Date Deposited: 20 Sep 2025 12:49
Last Modified: 20 Sep 2025 12:49
URI: https://repository.simad.edu.so/id/eprint/406

Actions (login required)

View Item
View Item