IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v9y2021i7p705-d523477.html
   My bibliography  Save this article

Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors

Author

Listed:
  • Hyunji Kim

    (Division of IT Convergence Engineering, Hansung University, Seoul 02876, Korea)

  • Jaehoon Park

    (Division of IT Convergence Engineering, Hansung University, Seoul 02876, Korea)

  • Hyeokdong Kwon

    (Division of IT Convergence Engineering, Hansung University, Seoul 02876, Korea)

  • Kyoungbae Jang

    (Division of IT Convergence Engineering, Hansung University, Seoul 02876, Korea)

  • Hwajeong Seo

    (Division of IT Convergence Engineering, Hansung University, Seoul 02876, Korea)

Abstract

A crypto-ransomware has the process to encrypt victim’s files. Afterward, the crypto-ransomware requests a ransom for the password of encrypted files to victims. In this paper, we present a novel approach to prevent crypto-ransomware by detecting block cipher algorithms for Internet of Things (IoT) platforms. We extract the sequence and frequency characteristics from the opcode of binary files for the 8-bit Alf and Vegard’s RISC (AVR) processor microcontroller. In other words, the late fusion method is used to extract two features from one source data, learn through each network, and integrate them. We classify the crypto-ransomware virus or harmless software through the proposed method. The general software from AVR packages and block cipher implementations written in C language from lightweight block cipher library (i.e., Fair Evaluation of Lightweight Cryptographic Systems (FELICS)) are trained through the deep learning network and evaluated. The general software and block cipher algorithms are successfully classified by training functions in binary files. Furthermore, we detect binary codes that encrypt a file using block ciphers. The detection rate is evaluated in terms of F-measure, which is the harmonic mean of precision and recall. The proposed method not only achieved 97% detection success rate for crypto-ransomware but also achieved 80% success rate in classification for each lightweight cryptographic algorithm and benign firmware. In addition, the success rate in classification for Substitution-Permutation-Network (SPN) structure, Addition-Rotation-eXclusive-or structures (ARX) structure, and benign firmware is 95%.

Suggested Citation

  • Hyunji Kim & Jaehoon Park & Hyeokdong Kwon & Kyoungbae Jang & Hwajeong Seo, 2021. "Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors," Mathematics, MDPI, vol. 9(7), pages 1-16, March.
  • Handle: RePEc:gam:jmathe:v:9:y:2021:i:7:p:705-:d:523477
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/9/7/705/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/9/7/705/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:9:y:2021:i:7:p:705-:d:523477. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.