Smart and Cost-effective system for Ransomware identification, detection, and prevention for IoT Enterprise Networks
Keywords:
Smart System, Cost effective solution, Ransomware identification, IoT, IoT Enterprise NetworksAbstract
As there is an increase of lightweight systems such as smartphones, on the Internet of Things (IoT) paradigm, it is important to strengthen security and prevent ransomware attacks from taking place. Ransomware attacks have become a significant threat to the security of IoT networks, and their impact can be severe and costly for enterprises. Traditional security mechanisms are no longer valid because of the involvement of resource-constrained systems, which require more computation power and resources. To further enhance ransomware detection capabilities, The proposed system uses a combination of machine learning and network monitoring techniques to detect and prevent ransomware attacks in real-time. This Research Study will address the ransomware attack cybersecurity issues using a state-of-the-art solution approach and develop a smart, effective, and affordable prototype solution for identifying, detecting, and preventing ransomware attacks on IoT enterprise networks. Its combination of machine learning and network monitoring techniques offers a robust defense against the growing threat of ransomware attacks, and its cost-effectiveness makes it accessible to enterprises of all sizes. In this Research Study, we aim to demonstrate the proposed framework, design practical implementation of the system.
Downloads
Metrics
References or Bibliography
Kothari, C. R. (2019). Research methodology: Method and techniques. Oest, A., Safaei, Y., Doupé, A., Ahn, G.-J., Wardman, B., & Tyers, K. (2019). Phishfarm: A scalable framework for measuring the effectiveness of evasion techniques against browser phishing blacklists. Paper presented at the 2019 IEEE Symposium on Security and Privacy (SP).
Yaqoob, I., Ahmed, E., Rehman, M., Ahmed, A., Al-garadi, M., Imran, M., & Guizani, M. (2017). The rise of ransomware and emerging security challenges in the Internet of Things. Computer Networks, 129, 444-458. https://www.sciencedirect.com/science/article/abs/pii/S1389128617303468.
Brinson, N. H., Eastin, M. S., & Cicchirillo, V. J. J. J. o. I.A. (2018). Reactance to personalization: Understanding the drivers behind the growth of ad blocking. 18(2), 136-147.
Carmi, E. J. I. R. o. L., Computers, & Technology. (2017). Regulating behaviours on the European Union internet, the case of spam versus cookies. 31(3), 289-307.
Al-Hawawreh, M., & Sitnikova, E. (2019). Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment. In 2019 Military Communications and Information Systems Conference (MilCIS) (pp. 1-6). Canberra, ACT, Australia. IEEE. doi: https://doi.org/10.1109/MilCIS.2019.8930732.
https://ieeexplore-ieee-org.masader.idm.oclc.org/stamp/stamp.jsp?tp=&arnumber=8930732
Asam, M., Khan, S.H., Akbar, A., Ahmed, E., & Hussain, S. (2022). IoT malware detection architecture using a novel channel boosted and squeezed CNN. Scientific Reports, 12, 15498. https://doi.org/10.1038/s41598-022-18936-9
https://www.nature.com/articles/s41598-022-18936-9#Sec3
Jamal, A., Hayat, M. F., & Nasir, M. (2022). Malware Detection and Classification in IoT Network using ANN. Mehran University Research Journal of Engineering and Technology, 41(1), 80+. https://link.gale.com/apps/doc/A689976395/AONE?u=googlescholar&sid=googleScholar&xid=b9641827
Wan, T.-L., Ban, T., Cheng, S.-M., Lee, Y.-T., Sun, B., Isawa, R., Takahashi, T., & Inoue, D. (2020). Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. IEEE Open Journal of the Computer Society, 1, 262-275. https://doi.org/10.1109/OJCS.2020.3033974.
https://ieeexplore-ieee-org.masader.idm.oclc.org/document/9240051
Published
How to Cite
Issue
Section
Copyright (c) 2023 Almahanad Nasser Rashid Al Kalbani, Mohammed Mujeebuddin, Raiyan Mustafa Mulla, Badar Saif Said Ali Al Hinai; Syed Imran Ali Kazmi, Muhammad Sohail Hayat
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.