Understanding the Behaviour of Android Ransomware Attacks with Real Smartphones Dataset

Atul Kumar, Ishu Sharma
{"title":"Understanding the Behaviour of Android Ransomware Attacks with Real Smartphones Dataset","authors":"Atul Kumar, Ishu Sharma","doi":"10.1109/ICONAT57137.2023.10080696","DOIUrl":null,"url":null,"abstract":"Android Security has become a frequently targeted area by cyber attackers and is widely exploited for several benefits by unauthorized users. The open-source model and affordable access to Android platforms enable smartphone users with multiple free applications and on the other hand, the same platform can be misused by attackers to achieve their goals. Android Ransomware attack is one of the majorly used attacks in the android malware domain and can affect android users with huge information and financial losses. Smartphone users store their personal to professional all kind of information in their smartphones and data breaches from the same source can put them in harmful circumstances. This research article focuses on android ransomware network architecture for detailed analysis and forming a further roadmap for the detection of such attacks. With technological capabilities, the detection of ransomware attacks at an early stage can secure from at least some levels of losses. Threat intelligence can be created using artificial intelligence-based methods for android malware attacks, but that requires clear identification of attributes and features that are involved in a particular cyberattack. In this experimental study, we have worked on CIC-AndMal2017 dataset that is being created by generating android malware attacks on real smartphones. We targeted the android ransomware attacks from this dataset and performed detailed exploratory data analysis to conclude the behaviour of different android ransomware attacks. The results drawn from this experimental study help the researcher to build artificial intelligence-based ransomware detection methodologies for the android platform.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference for Advancement in Technology (ICONAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONAT57137.2023.10080696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Android Security has become a frequently targeted area by cyber attackers and is widely exploited for several benefits by unauthorized users. The open-source model and affordable access to Android platforms enable smartphone users with multiple free applications and on the other hand, the same platform can be misused by attackers to achieve their goals. Android Ransomware attack is one of the majorly used attacks in the android malware domain and can affect android users with huge information and financial losses. Smartphone users store their personal to professional all kind of information in their smartphones and data breaches from the same source can put them in harmful circumstances. This research article focuses on android ransomware network architecture for detailed analysis and forming a further roadmap for the detection of such attacks. With technological capabilities, the detection of ransomware attacks at an early stage can secure from at least some levels of losses. Threat intelligence can be created using artificial intelligence-based methods for android malware attacks, but that requires clear identification of attributes and features that are involved in a particular cyberattack. In this experimental study, we have worked on CIC-AndMal2017 dataset that is being created by generating android malware attacks on real smartphones. We targeted the android ransomware attacks from this dataset and performed detailed exploratory data analysis to conclude the behaviour of different android ransomware attacks. The results drawn from this experimental study help the researcher to build artificial intelligence-based ransomware detection methodologies for the android platform.
利用真实智能手机数据集了解Android勒索软件攻击行为
Android Security已成为网络攻击者的频繁攻击目标,并被未经授权的用户广泛利用。开源模式和Android平台的可负担访问权限使智能手机用户能够使用多个免费应用程序,另一方面,同一平台可能被攻击者滥用以达到他们的目的。Android勒索软件攻击是Android恶意软件领域最常用的攻击之一,会给Android用户带来巨大的信息和经济损失。智能手机用户将他们的个人信息和专业信息存储在他们的智能手机中,来自同一来源的数据泄露可能会使他们处于有害的境地。本文主要针对android勒索软件的网络架构进行详细的分析,并形成进一步的检测此类攻击的路线图。凭借技术能力,在早期阶段检测勒索软件攻击可以确保至少在一定程度上避免损失。威胁情报可以使用基于人工智能的方法来创建android恶意软件攻击,但这需要明确识别特定网络攻击所涉及的属性和特征。在这项实验研究中,我们对CIC-AndMal2017数据集进行了研究,该数据集是通过在真实的智能手机上生成android恶意软件攻击而创建的。我们针对此数据集中的android勒索软件攻击进行了详细的探索性数据分析,以总结不同android勒索软件攻击的行为。从这项实验研究中得出的结果有助于研究人员为android平台构建基于人工智能的勒索软件检测方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信