Por favor, use este identificador para citar o enlazar este ítem: https://doi.org/10.1016/j.cose.2023.103510

Título: Behavioral fingerprinting to detect ransomware in resource-constrained devices
Fecha de publicación: dic-2023
Editorial: Elsevier
Cita bibliográfica: Computer and Security, 2023, Vol. 135: 103510
ISSN: Print: 0167-4048
Palabras clave: Cybersecurity
Ransomware
Fingerprinting
Machine learning
Resumen: The Internet of Things (IoT), a network of interconnected devices, has grown and gained traction over the last few years. This paradigm can impact our lives while also providing significant economic benefits. However, although resource-constrained IoT devices offer numerous advantages, they are also vulnerable to cyberattacks. As a result, ransomware severely threatens IoT devices managing sensitive and relevant information. Solutions based on Machine and Deep Learning (ML/DL) that consider behavioral data have been identified as promising. However, most detection solutions have been developed for Windows-based systems, which generally have more resources than IoT devices. As a result, these solutions are not suitable for resource-constrained components. In addition, no solution compares the pros and cons of different behavioral dimensions of resource-constrained devices. Thus, this work presents a framework that combines three different behavioral sources with supervised and unsupervised ML/DL algorithms to detect and classify heterogeneous ransomware impacting resource-constrained spectrum sensors. A pool of experiments has demonstrated the suitability of the proposed solution and compared its performance with a rule-based system. In conclusion, the usage of resources combined with local outlier factor and decision tree are the most promising combinations to detect anomalies and classify ransomware while consuming CPU, RAM, and time of devices in a reduced manner.
Autor/es principal/es: Huertas Celdrán, Alberto
Sánchez Sánchez, Pedro Miguel
Von der Assen, Jan
Shushack, Dennis
Perales Gómez, Ángel Luis
Bovet, Gérôme
Martínez Pérez, Gregorio
Stiller, Burkhard
Versión del editor: https://www.sciencedirect.com/science/article/pii/S0167404823004200?via%3Dihub
URI: http://hdl.handle.net/10201/142754
DOI: https://doi.org/10.1016/j.cose.2023.103510
Tipo de documento: info:eu-repo/semantics/article
Número páginas / Extensión: 14
Derechos: info:eu-repo/semantics/openAccess
Atribución-NoComercial 4.0 Internacional
Descripción: © 2023 The Author(s). This manuscript version is made available under the CC-BY-NC 4.0 license http://creativecommons.org/licenses/by-nc/4.0/ This document is the Published version of a Published Work that appeared in final form in Computer and Security. To access the final edited and published work see https://doi.org/10.1016/j.cose.2023.103510
Aparece en las colecciones:Artículos: Ingeniería y Tecnología de Computadores

Ficheros en este ítem:
Fichero Descripción TamañoFormato 
1-beh-main.pdf1,01 MBAdobe PDFVista previa
Visualizar/Abrir


Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons Creative Commons