Edge computing has been of most advantage to the new promising emergent paradigm, Internet of Thi... more Edge computing has been of most advantage to the new promising emergent paradigm, Internet of Things, allowing data and applications to be processed and stored at the edge of the network than to the cloud hence reducing the latency of transmission data. Edge computing devices are faced with security challenges. Ransomware has become a significant global threat with the ransomware-as-a-service model enabling easy availability and deployment, and the potential for high revenues creating a viable criminal business model. Although machine learning algorithms are already been used to detect ransomware, featuring engineering process is mostly tedious, time consuming and more so inefficient and biased features are mostly extracted. In this paper, we proposed a deep learning method which eliminates feature engineering, the method is used in the classification of ransomware. We obtained a 99.7% true positive rate indicating that our classifier is the best.
International Journal of Engineering Research & Technology (IJERT), 2021
Internet of Things (IoT) devices generates a huge volume of data that needs to be processed at re... more Internet of Things (IoT) devices generates a huge volume of data that needs to be processed at real time. Cloud computing paradigm has been a requisite part of this process, consequently, the physical distance between users and cloud increases transmission latency which makes cloud computing not too suitable for real time applications. To address this issue, Edge Computing (EC) which collaborates with the cloud computing allows the processing and storage of applications and data in real time from different geographical locations. As EC is being accepted in the ICT environment, it is also faced with a lot of security issues. In this paper, an investigation on the impacts of ransomware attacks on EC devices is conducted and presents some ransomware families that target edge devices. The study presented some solutions proposed in the literature on securing EC devices against ransomware attacks, however there is a need to provide proactive measures and also apply more robust methods such as, deep learning than the traditional signature based or shallow machine learning approaches which are not recommendable and robust enough in handling complex malwares like ransomware. Thus, the researchers proposed a deep learning framework for the detection of ransomware on EC devices.
International Journal of Scientific & Technology Research, 2020
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with...
International Journal of Scientific Research in Engineering and Management (IJSREM), 2022
The adverse impact caused by ransomware on computing systems poses a major threat to everyday use... more The adverse impact caused by ransomware on computing systems poses a major threat to everyday users and society in general. With continuous growth in ransomware, and newer malicious families emerging every month, the need for strong defensive methods increases every day. While expert-based systems are developed over time, this rate of growth in ransomware creates a need for self-evolving methods of defence that can learn from available data and improve over time. Deep learning methods, in particular, can provide this ability to improve learning with the increasing availability of data. This research proposes an alternative ransomware detection technique using deep learning, specifically Recurrent-Convolutional Neural Network (R-CNN), which will speed up the training time and extract high level features to give more accurate classification. Consequently, our model has improved the classification accuracy of the existing systems to 98.00%. The comparisons with other state-of-the art peer approaches have proven that our empirical model is promising.
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with...
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with the speedy and efficient technology required to operate AI systems, they are likely to improve the protection of customers and businesses in the cyberspace. This is proven by the increasing deployment of AI engines rather than conventional scanning engines in cyber security.
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with...
Edge computing has been of most advantage to the new promising emergent paradigm, Internet of Thi... more Edge computing has been of most advantage to the new promising emergent paradigm, Internet of Things, allowing data and applications to be processed and stored at the edge of the network than to the cloud hence reducing the latency of transmission data. Edge computing devices are faced with security challenges. Ransomware has become a significant global threat with the ransomware-as-a-service model enabling easy availability and deployment, and the potential for high revenues creating a viable criminal business model. Although machine learning algorithms are already been used to detect ransomware, featuring engineering process is mostly tedious, time consuming and more so inefficient and biased features are mostly extracted. In this paper, we proposed a deep learning method which eliminates feature engineering, the method is used in the classification of ransomware. We obtained a 99.7% true positive rate indicating that our classifier is the best.
International Journal of Engineering Research & Technology (IJERT), 2021
Internet of Things (IoT) devices generates a huge volume of data that needs to be processed at re... more Internet of Things (IoT) devices generates a huge volume of data that needs to be processed at real time. Cloud computing paradigm has been a requisite part of this process, consequently, the physical distance between users and cloud increases transmission latency which makes cloud computing not too suitable for real time applications. To address this issue, Edge Computing (EC) which collaborates with the cloud computing allows the processing and storage of applications and data in real time from different geographical locations. As EC is being accepted in the ICT environment, it is also faced with a lot of security issues. In this paper, an investigation on the impacts of ransomware attacks on EC devices is conducted and presents some ransomware families that target edge devices. The study presented some solutions proposed in the literature on securing EC devices against ransomware attacks, however there is a need to provide proactive measures and also apply more robust methods such as, deep learning than the traditional signature based or shallow machine learning approaches which are not recommendable and robust enough in handling complex malwares like ransomware. Thus, the researchers proposed a deep learning framework for the detection of ransomware on EC devices.
International Journal of Scientific & Technology Research, 2020
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with...
International Journal of Scientific Research in Engineering and Management (IJSREM), 2022
The adverse impact caused by ransomware on computing systems poses a major threat to everyday use... more The adverse impact caused by ransomware on computing systems poses a major threat to everyday users and society in general. With continuous growth in ransomware, and newer malicious families emerging every month, the need for strong defensive methods increases every day. While expert-based systems are developed over time, this rate of growth in ransomware creates a need for self-evolving methods of defence that can learn from available data and improve over time. Deep learning methods, in particular, can provide this ability to improve learning with the increasing availability of data. This research proposes an alternative ransomware detection technique using deep learning, specifically Recurrent-Convolutional Neural Network (R-CNN), which will speed up the training time and extract high level features to give more accurate classification. Consequently, our model has improved the classification accuracy of the existing systems to 98.00%. The comparisons with other state-of-the art peer approaches have proven that our empirical model is promising.
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with...
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with the speedy and efficient technology required to operate AI systems, they are likely to improve the protection of customers and businesses in the cyberspace. This is proven by the increasing deployment of AI engines rather than conventional scanning engines in cyber security.
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and... more the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with...
Uploads
Papers by Goteng K . Job