{"id":"https://openalex.org/W4296167572","doi":"https://doi.org/10.3233/faia220282","title":"Multi-Classification of Imbalance Worm Ransomware in the IoMT System","display_name":"Multi-Classification of Imbalance Worm Ransomware in the IoMT System","publication_year":2022,"publication_date":"2022-09-14","ids":{"openalex":"https://openalex.org/W4296167572","doi":"https://doi.org/10.3233/faia220282"},"language":"en","primary_location":{"id":"doi:10.3233/faia220282","is_oa":false,"landing_page_url":"https://doi.org/10.3233/faia220282","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026662963","display_name":"Shilan S. Hameed","orcid":"https://orcid.org/0000-0002-8596-644X"},"institutions":[{"id":"https://openalex.org/I4896460","display_name":"Koya University","ror":"https://ror.org/017pq0w72","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4896460"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Shilan S. Hameed","raw_affiliation_strings":["Directorate of Information Technology, Koya University, 44023 Koya., Iraq","Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","Directorate of Information Technology, Koya University, 44023 Koya., Iraq; Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia"],"affiliations":[{"raw_affiliation_string":"Directorate of Information Technology, Koya University, 44023 Koya., Iraq","institution_ids":["https://openalex.org/I4896460"]},{"raw_affiliation_string":"Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","institution_ids":[]},{"raw_affiliation_string":"Directorate of Information Technology, Koya University, 44023 Koya., Iraq; Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","institution_ids":["https://openalex.org/I4896460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089742876","display_name":"Ali Selamat","orcid":"https://orcid.org/0000-0001-9746-8459"},"institutions":[{"id":"https://openalex.org/I75092371","display_name":"University of Hradec Kr\u00e1lov\u00e9","ror":"https://ror.org/05k238v14","country_code":"CZ","type":"education","lineage":["https://openalex.org/I75092371"]},{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["CZ","MY"],"is_corresponding":false,"raw_author_name":"Ali Selamat","raw_affiliation_strings":["Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","Media and Games Center of Excellence (MagicX), Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Malaysia","School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia","Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic; Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia; School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","institution_ids":["https://openalex.org/I75092371"]},{"raw_affiliation_string":"Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","institution_ids":[]},{"raw_affiliation_string":"Media and Games Center of Excellence (MagicX), Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic; Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia; School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418","https://openalex.org/I75092371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049854354","display_name":"Liza Abdul Latiff","orcid":"https://orcid.org/0000-0002-5652-5477"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Liza Abdul Latiff","raw_affiliation_strings":["Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030241377","display_name":"Shukor Abd Razak","orcid":"https://orcid.org/0000-0002-8824-6069"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shukor A. Razak","raw_affiliation_strings":["School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045569977","display_name":"Ond\u0159ej Krejcar","orcid":"https://orcid.org/0000-0002-5992-2574"},"institutions":[{"id":"https://openalex.org/I75092371","display_name":"University of Hradec Kr\u00e1lov\u00e9","ror":"https://ror.org/05k238v14","country_code":"CZ","type":"education","lineage":["https://openalex.org/I75092371"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Ondrej Krejcar","raw_affiliation_strings":["Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic; Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic","institution_ids":["https://openalex.org/I75092371"]},{"raw_affiliation_string":"Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","institution_ids":[]},{"raw_affiliation_string":"Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic; Malaysia-Japan International Institute of Technology (MJIIT), University Teknologi Malaysia, Kuala Lumpur 54100, Malaysia","institution_ids":["https://openalex.org/I75092371"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026662963"],"corresponding_institution_ids":["https://openalex.org/I4896460"],"apc_list":null,"apc_paid":null,"fwci":0.4035,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56818182,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8946118950843811},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7171944975852966},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.626039981842041},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.6091263890266418},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.532394289970398},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5001685619354248},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.45333796739578247},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.43802231550216675},{"id":"https://openalex.org/keywords/resampling","display_name":"Resampling","score":0.42326340079307556},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.38320010900497437},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36107563972473145},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.30898767709732056},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.2671797573566437},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16809847950935364}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8946118950843811},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7171944975852966},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.626039981842041},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6091263890266418},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.532394289970398},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5001685619354248},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.45333796739578247},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.43802231550216675},{"id":"https://openalex.org/C150921843","wikidata":"https://www.wikidata.org/wiki/Q1170431","display_name":"Resampling","level":2,"score":0.42326340079307556},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38320010900497437},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36107563972473145},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.30898767709732056},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2671797573566437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16809847950935364}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia220282","is_oa":false,"landing_page_url":"https://doi.org/10.3233/faia220282","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4205958290","https://openalex.org/W2595988085","https://openalex.org/W2126100045","https://openalex.org/W4280611221","https://openalex.org/W4213227066","https://openalex.org/W2979979539","https://openalex.org/W3193301557","https://openalex.org/W4319983935","https://openalex.org/W3014147770","https://openalex.org/W4296167572"],"abstract_inverted_index":{"Worm-like":[0],"ransomware":[1,18,34,59,93,142],"strains":[2],"spread":[3,22],"quickly":[4],"to":[5,31],"critical":[6],"systems":[7],"such":[8],"as":[9],"IoMT":[10],"without":[11],"human":[12],"interaction.":[13],"Therefore,":[14],"detecting":[15],"different":[16,64],"worm-like":[17],"attacks":[19],"during":[20],"their":[21],"is":[23,75],"vital.":[24],"Nevertheless,":[25],"the":[26,32,37,81,89,108,135,145,149],"low":[27],"detection":[28,38,44,143,150],"rate":[29],"due":[30],"imbalanced":[33],"data":[35],"and":[36,63,77,91,95,124,140,153],"systems\u2019":[39],"disability":[40],"for":[41,57,106],"multiclass":[42],"simultaneous":[43,141],"are":[45],"two":[46],"apparent":[47],"problems.":[48],"In":[49,80],"this":[50],"work,":[51],"we":[52],"proposed":[53,67],"a":[54,125],"new":[55],"approach":[56],"multi-classifying":[58],"using":[60],"preprocessing,":[61],"resampling,":[62],"classifiers.":[65],"The":[66,130],"system":[68],"uses":[69],"network":[70],"traffic":[71],"NetFlow":[72],"data,":[73],"which":[74],"privacy-friendly":[76],"not":[78],"heavy.":[79],"first":[82],"phase,":[83],"preprocessing":[84,137],"techniques":[85],"were":[86,115],"used":[87,105],"on":[88],"collected":[90],"aggregated":[92],"traffic,":[94],"then":[96],"an":[97],"optimized":[98],"Synthetic":[99],"Minority":[100],"Oversampling":[101],"Technique":[102],"(SMOTE)":[103],"was":[104],"resampling":[107,146],"low-class":[109],"samples.":[110],"After":[111],"that,":[112],"four":[113],"classifiers":[114],"applied,":[116],"namely,":[117],"Bayes":[118],"Net,":[119],"Hoeffding":[120],"Tree,":[121],"K-Nearest":[122],"Neighbor,":[123],"lightweight":[126],"Multi-Layered":[127],"Perceptron":[128],"(MLP).":[129],"experimental":[131],"results":[132],"showed":[133],"that":[134],"efficient":[136],"ensured":[138],"accurate":[139],"while":[144],"technique":[147],"improved":[148],"rate,":[151],"F1,":[152],"PRC":[154],"curve.":[155]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
