Advances in Computer Communication and
Computational Sciences Proceedings of IC4S 2019
Sanjiv K. Bhatia pdf download
https://textbookfull.com/product/advances-in-computer-communication-and-computational-sciences-
proceedings-of-ic4s-2019-sanjiv-k-bhatia/
★★★★★ 4.8/5.0 (27 reviews) ✓ 186 downloads ■ TOP RATED
"Fantastic PDF quality, very satisfied with download!" - Emma W.
DOWNLOAD EBOOK
Advances in Computer Communication and Computational
Sciences Proceedings of IC4S 2019 Sanjiv K. Bhatia pdf
download
TEXTBOOK EBOOK TEXTBOOK FULL
Available Formats
■ PDF eBook Study Guide TextBook
EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME
INSTANT DOWNLOAD VIEW LIBRARY
Collection Highlights
Advances in Computer Communication and Computational
Sciences: Proceedings of IC4S 2018 Sanjiv K. Bhatia
Advances in Computer Communication and Computational
Sciences: Proceedings of IC4S 2017, Volume 1 Sanjiv K.
Bhatia
Advances in Communication and Computational Technology
Select Proceedings of ICACCT 2019 Gurdeep Singh Hura
Advances in Computational Intelligence and Communication
Technology Proceedings of CICT 2019 Xiao-Zhi Gao
Advances in Information Communication Technology and
Computing Proceedings of AICTC 2019 Vishal Goar
Advances in VLSI Communication and Signal Processing
Select Proceedings of VCAS 2019 David Harvey
Advances in Computer Vision: Proceedings of the 2019
Computer Vision Conference (CVC), Volume 1 Kohei Arai
Advances in Structural Engineering: Select Proceedings of
FACE 2019 K. V. L. Subramaniam
Advances in IC Engines and Combustion Technology: Select
Proceedings of NCICEC 2019 Ashwani K. Gupta
Advances in Intelligent Systems and Computing 1158
Sanjiv K. Bhatia · Shailesh Tiwari ·
Su Ruidan · Munesh Chandra Trivedi ·
K. K. Mishra Editors
Advances in
Computer,
Communication
and Computational
Sciences
Proceedings of IC4S 2019
Advances in Intelligent Systems and Computing
Volume 1158
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/11156
Sanjiv K. Bhatia Shailesh Tiwari
• •
Su Ruidan Munesh Chandra Trivedi
• •
K. K. Mishra
Editors
Advances in Computer,
Communication
and Computational Sciences
Proceedings of IC4S 2019
123
Editors
Sanjiv K. Bhatia Shailesh Tiwari
Department of Mathematics Computer Science Engineering Department
and Computer Science ABES Engineering College
University of Missouri–St. Louis Ghaziabad, Uttar Pradesh, India
Chesterfield, MO, USA
Munesh Chandra Trivedi
Su Ruidan National Institute of Technology Agartala
Shanghai Advanced Research Institute Agartala, Tripura, India
Pudong, China
K. K. Mishra
Computer Science Engineering Department
Motilal Nehru National Institute
of Technology
Allahabad, Uttar Pradesh, India
ISSN 2194-5357 ISSN 2194-5365 (electronic)
Advances in Intelligent Systems and Computing
ISBN 978-981-15-4408-8 ISBN 978-981-15-4409-5 (eBook)
https://doi.org/10.1007/978-981-15-4409-5
© Springer Nature Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
The IC4S is a major multidisciplinary conference organized with the objective of
bringing together researchers, developers and practitioners from academia and
industry working in all areas of computer and computational sciences. It is orga-
nized specifically to help computer industry to derive the advances of
next-generation computer and communication technology. Researchers invited to
speak will present the latest developments and technical solutions.
Technological developments all over the world are dependent upon globalization
of various research activities. Exchange of information and innovative ideas is
necessary to accelerate the development of technology. Keeping this ideology in
preference, the International Conference on Computer, Communication and
Computational Sciences (IC4S 2019) has been organized at Mandarin Hotel
Bangkok, Bangkok, Thailand, during 11–12 October 2019.
This is the third time the International Conference on Computer, Communication
and Computational Sciences has been organized with a foreseen objective of
enhancing the research activities at a large scale. Technical Program Committee and
Advisory Board of IC4S include eminent academicians, researchers and practi-
tioners from abroad as well as from all over the nation.
In this book, selected manuscripts have been subdivided into various tracks
named—Advanced Communications and Security, Intelligent Hardware and
Software Design, Intelligent Computing Techniques, Web and Informatics and
Intelligent Image Processing. A sincere effort has been made to make it an immense
source of knowledge for all and includes 91 manuscripts. The selected manuscripts
have gone through a rigorous review process and are revised by authors after
incorporating the suggestions of the reviewers.
IC4S 2018 received around 490 submissions from around 770 authors of 22
different countries such as USA, Iceland, China, Saudi Arabia, South Africa,
Taiwan, Malaysia, Indonesia, Europe and many more. Each submission has been
gone through the plagiarism check. On the basis of plagiarism report, each sub-
mission was rigorously reviewed by atleast two reviewers with an average of 2.4
per reviewer. Even some submissions have more than two reviews. On the basis
v
vi Preface
of these reviews, 91 high-quality papers were selected for publication in this pro-
ceedings volume, with an acceptance rate of 18.57%.
We are thankful to the keynote speakers—Prof. Shyi-Ming Chen, IEEE Fellow,
IET Fellow, IFSA Fellow, Chair Professor in National Taiwan University of
Science and Technology, Taiwan, and Prof. Maode Ma, IET Fellow, Nanyang
Technological University, Singapore, to enlighten the participants with their
knowledge and insights. We are also thankful to delegates and the authors for their
participation and their interest in IC4S 2019 as a platform to share their ideas and
innovation. We are also thankful to the Prof. Dr. Janusz Kacprzyk, Series Editor,
AISC, Springer, for providing guidance and support. Also, we extend our heartfelt
gratitude to the reviewers and Technical Program Committee Members for showing
their concern and efforts in the review process. We are indeed thankful to everyone
directly or indirectly associated with the conference organizing team leading it
towards the success.
Although utmost care has been taken in compilation and editing, however, a few
errors may still occur. We request the participants to bear with such errors and
lapses (if any). We wish you all the best.
Editors
Bangkok, Thailand Sanjiv K. Bhatia
Shailesh Tiwari
Munesh Chandra Trivedi
K. K. Mishra
About This Book
With advent of technology, intelligent and soft computing techniques came into
existence with a wide scope of implementation in engineering sciences. Nowadays,
technology is changing with a speedy pace and innovative proposals that solve the
engineering problems intelligently are gaining popularity and advantages over the
conventional solutions to these problems. It is very important for research com-
munity to track the latest advancements in the field of computer sciences. Keeping
this ideology in preference, this book includes the insights that reflect the Advances
in Computer and Computational Sciences from upcoming researchers and leading
academicians across the globe. It contains the high-quality peer-reviewed papers of
‘International Conference on Computer, Communication and Computational
Sciences (IC4S-2019)’, held during 11–12 October 2019 at Mandarin Hotel
Bangkok, Bangkok, Thailand. These papers are arranged in the form of chapters.
The content of this book is divided into five broader tracks that cover variety of
topics. These tracks are: Advanced Communications and Security, Intelligent
Hardware and Software Design, Intelligent Computing Techniques, Web and
Informatics and Intelligent Image Processing. This book helps the perspective
readers’ from computer and communication industry and academia to derive the
immediate surroundings developments in the field of communication and computer
sciences and shape them into real-life applications.
vii
Contents
Advanced Communications and Security
A Novel Crypto-Ransomware Family Classification Based
on Horizontal Feature Simplification . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha,
and Mohammad Dabbagh
Characteristic Analysis and Experimental Simulation of Diffuse Link
Channel for Indoor Wireless Optical Communication . . . . . . . . . . . . . 15
Peinan He and Mingyou He
A Comparative Analysis of Malware Anomaly Detection . . . . . . . . . . . 35
Priynka Sharma, Kaylash Chaudhary,
Michael Wagner, and M. G. M. Khan
Future Identity Card Using Lattice-Based Cryptography
and Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Febrian Kurniawan and Gandeva Bayu Satrya
Cryptanalysis on Attribute-Based Encryption from Ring-Learning
with Error (R-LWE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Tan Soo Fun and Azman Samsudin
Enhanced Password-Based Authentication Mechanism in Cloud
Computing with Extended Honey Encryption (XHE): A Case Study
on Diabetes Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Tan Soo Fun, Fatimah Ahmedy, Zhi Ming Foo, Suraya Alias,
and Rayner Alfred
An Enhanced Wireless Presentation System for Large-Scale Content
Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Khong-Neng Choong, Vethanayagam Chrishanton,
and Shahnim Khalid Putri
ix
x Contents
On Confidentiality, Integrity, Authenticity, and Freshness (CIAF)
in WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Shafiqul Abidin, Vikas Rao Vadi, and Ankur Rana
Networking Analysis and Performance Comparison of Kubernetes
CNI Plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Ritik Kumar and Munesh Chandra Trivedi
Classifying Time-Bound Hierarchical Key Assignment Schemes . . . . . 111
Vikas Rao Vadi, Naveen Kumar, and Shafiqul Abidin
A Survey on Cloud Workflow Collaborative Adaptive Scheduling . . . . 121
Delong Cui, Zhiping Peng, Qirui Li, Jieguang He, Lizi Zheng,
and Yiheng Yuan
Lattice CP-ABE Scheme Supporting Reduced-OBDD Structure . . . . . 131
Eric Affum, Xiasong Zhang, and Xiaofen Wang
Crypto-SAP Protocol for Sybil Attack Prevention in VANETs . . . . . . 143
Mohamed Khalil and Marianne A. Azer
Managerial Computer Communication: Implementation of Applied
Linguistics Approaches in Managing Electronic Communication . . . . . 153
Marcel Pikhart and Blanka Klímová
Advance Persistent Threat—A Systematic Review of Literature
and Meta-Analysis of Threat Vectors . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Safdar Hussain, Maaz Bin Ahmad, and Shariq Siraj Uddin Ghouri
Construction of a Teaching Support System Based on 5G
Communication Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Hanhui Lin, Shaoqun Xie, and Yongxia Luo
Intelligent Hardware and Software Design
Investigating the Noise Barrier Impact on Aerodynamics Noise:
Case Study at Jakarta MRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Sugiono Sugiono, Siti Nurlaela, Andyka Kusuma, Achmad Wicaksono,
and Rio P. Lukodono
3D Cylindrical Obstacle Avoidance Using the Minimum Distance
Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Krishna Raghuwaiya, Jito Vanualailai, and Jai Raj
Path Planning of Multiple Mobile Robots in a Dynamic 3D
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Jai Raj, Krishna Raghuwaiya, Jito Vanualailai, and Bibhya Sharma
Autonomous Quadrotor Maneuvers in a 3D Complex
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Jito Vanualailai, Jai Raj, and Krishna Raghuwaiya
Contents xi
Tailoring Scrum Methodology for Game Development . . . . . . . . . . . . 233
Towsif Zahin Khan, Shairil Hossain Tusher, Mahady Hasan,
and M. Rokonuzzaman
Designing and Developing a Game with Marketing Concepts . . . . . . . 245
Towsif Zahin Khan, Shairil Hossain Tusher, Mahady Hasan,
and M. Rokonuzzaman
Some Variants of Cellular Automata . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Ray-Ming Chen
An Exchange Center Based Digital Cash Payment Solution . . . . . . . . . 265
Yong Xu and Jingwen Li
Design and Implementation of Pianos Sharing System
Based on PHP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Sheng Liu, Chu Yang, and Xiaoming You
A Stochastic Framework for Social Media Adoption
or Abandonment: Higher Education . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Mostafa Hamadi, Jamal El-Den, Cherry Narumon Sriratanaviriyakul,
and Sami Azam
Low-Earth Orbital Internet of Things Satellite System on the Basis
of Distributed Satellite Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Mikhail Ilchenko, Teodor Narytnyk, Vladimir Prisyazhny, Segii Kapshtyk,
and Sergey Matvienko
Automation of the Requisition Process in Material Supply Chain
of Construction Firms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Adedeji Afolabi, Yewande Abraham, Rapheal Ojelabi,
and Oluwafikunmi Awosika
Developing an Adaptable Web-Based Profile Record Management
System for Construction Firms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Adedeji Afolabi, Yewande Abraham, Rapheal Ojelabi,
and Etuk Hephzibah
Profile Control System for Improving Recommendation Services . . . . 335
Jaewon Park, B. Temuujin, Hyokyung Chang, and Euiin Choi
IoT-Based Smart Application System to Prevent Sexual Harassment
in Public Transport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Md. Wahidul Hasan, Akil Hamid Chowdhury, Md Mehedi Hasan,
Arup Ratan Datta, A. K. M. Mahbubur Rahman, and M. Ashraful Amin
A Decision Support System Based on WebGIS for Supporting
Community Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Wichai Puarungroj, Suchada Phromkhot, Narong Boonsirisumpun,
and Pathapong Pongpatrakant
xii Contents
Structural Application of Medical Image Report Based
on Bi-CNNs-LSTM-CRF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Aesha Abdullah Moallim and Li Ji Yun
Integrating QR Code-Based Approach to University e-Class System
for Managing Student Attendance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Suwaibah Abu Bakar, Shahril Nazim Mohamed Salleh, Azamuddin Rasidi,
Rosmaini Tasmin, Nor Aziati Abd Hamid, Ramatu Muhammad Nda,
and Mohd Saufi Che Rusuli
Intelligent Computing Techniques
Decision-Making System in Tannery by Using Fuzzy Logic . . . . . . . . . 391
Umaphorn Tan and Kanate Puntusavase
A Study on Autoplay Model Using DNN in Turn-Based RPG . . . . . . . 399
Myoungyoung Kim, Jaemin Kim, Deukgyu Lee, Jihyeong Son,
and Wonhyung Lee
Simulation Optimization for Solving Multi-objective Stochastic
Sustainable Liner Shipping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Saowanit Lekhavat and Habin Lee
Fast Algorithm for Sequence Edit Distance Computation . . . . . . . . . . 417
Hou-Sheng Chen, Li-Ren Liu, and Jian-Jiun Ding
Predicting Student Final Score Using Deep Learning . . . . . . . . . . . . . . 429
Mohammad Alodat
Stance Detection Using Transformer Architectures and Temporal
Convolutional Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Kushal Jain, Fenil Doshi, and Lakshmi Kurup
Updated Frequency-Based Bat Algorithm (UFBBA) for Feature
Selection and Vote Classifier in Predicting Heart Disease . . . . . . . . . . 449
Himanshu Sharma and Rohit Agarwal
A New Enhanced Recurrent Extreme Learning Machine Based
on Feature Fusion with CNN Deep Features for Breast Cancer
Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Rohit Agarwal and Himanshu Sharma
Deep Learning-Based Severe Dengue Prognosis Using Human
Genome Data with Novel Feature Selection Method . . . . . . . . . . . . . . . 473
Aasheesh Shukla and Vishal Goyal
An Improved DCNN-Based Classification and Automatic Age
Estimation from Multi-factorial MRI Data . . . . . . . . . . . . . . . . . . . . . . 483
Ashish Sharma and Anjani Rai
Contents xiii
The Application of Machine Learning Methods in Drug
Consumption Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Peng Han
Set Representation of Itemset for Candidate Generation with Binary
Search Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Carynthia Kharkongor and Bhabesh Nath
Robust Moving Targets Detection Based on Multiple Features . . . . . . 521
Jing Jin, Jianwu Dang, Yangpin Wang, Dong Shen, and Fengwen Zhai
Digital Rock Image Enhancement via a Deep Learning
Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Yunfeng Bai and Vladimir Berezovsky
Enhancing PSO for Dealing with Large Data Dimensionality
by Cooperative Coevolutionary with Dynamic Species-Structure
Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Kittipong Boonlong and Karoon Suksonghong
A New Encoded Scheme GA for Solving Portfolio Optimization
Problems in the Big Data Environment . . . . . . . . . . . . . . . . . . . . . . . . 551
Karoon Suksonghong and Kittipong Boonlong
Multistage Search for Performance Enhancement of Ant Colony
Optimization in Randomly Generated Road Profile Identification
Using a Quarter Vehicle Vibration Responses . . . . . . . . . . . . . . . . . . . 561
Kittikon Chantarattanakamol and Kittipong Boonlong
Classification and Visualization of Poverty Status: Analyzing
the Need for Poverty Assistance Using SVM . . . . . . . . . . . . . . . . . . . . 571
Maricel P. Naviamos and Jasmin D. Niguidula
Comparative Analysis of Prediction Algorithms for Heart
Diseases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Ishita Karun
Sarcasm Detection Approaches Survey . . . . . . . . . . . . . . . . . . . . . . . . . 593
Anirudh Kamath, Rahul Guhekar, Mihir Makwana, and Sudhir N. Dhage
Web and Informatics
Interactive Animation and Affective Teaching and Learning
in Programming Courses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Alvin Prasad and Kaylash Chaudhary
IoT and Computer Vision-Based Electronic Voting System . . . . . . . . . 625
Md. Nazmul Islam Shuzan, Mahmudur Rashid, Md. Aowrongajab Uaday,
and M. Monir Uddin
xiv Contents
Lexical Repository Development for Bugis, a Minority Language . . . . 639
Sharifah Raihan Syed Jaafar, Nor Hashimah Jalaluddin,
Rosmiza Mohd Zainol, and Rahilah Omar
Toward EU-GDPR Compliant Blockchains with Intentional
Forking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Wolf Posdorfer, Julian Kalinowski, and Heiko Bornholdt
Incorum: A Citizen-Centric Sensor Data Marketplace for Urban
Participation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Heiko Bornholdt, Dirk Bade, and Wolf Posdorfer
Developing an Instrument for Cloud-Based E-Learning Adoption:
Higher Education Institutions Perspective . . . . . . . . . . . . . . . . . . . . . . 671
Qasim AlAjmi, Ruzaini Abdullah Arshah, Adzhar Kamaludin,
and Mohammed A. Al-Sharafi
Gamification Application in Different Business Software
Systems—State of Art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Zornitsa Yordanova
Data Exchange Between JADE and Simulink Model for Multi-agent
Control Using NoSQL Database Redis . . . . . . . . . . . . . . . . . . . . . . . . . 695
Yulia Berezovskaya, Vladimir Berezovsky, and Margarita Undozerova
Visualizing Academic Experts on a Subject Domain Map
of Cartographic-Alike . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Diana Purwitasari, Rezky Alamsyah, Dini Adni Navastara,
Chastine Fatichah, Surya Sumpeno, and Mauridhi Hery Purnomo
An Empirical Analysis of Spatial Regression for Vegetation
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Hemlata Goyal, Sunita Singhal, Chilka Sharma, and Mahaveer Punia
Extracting Temporal-Based Spatial Features in Imbalanced Data
for Predicting Dengue Virus Transmission . . . . . . . . . . . . . . . . . . . . . . 731
Arfinda Setiyoutami, Wiwik Anggraeni, Diana Purwitasari,
Eko Mulyanto Yuniarno, and Mauridhi Hery Purnomo
The Application of Medical and Health Informatics Among
the Malaysian Medical Tourism Hospital: A Preliminary Study . . . . . 743
Hazila Timan, Nazri Kama, Rasimah Che Mohd Yusoff, and Mazlan Ali
Design of Learning Digital Tools Through a User Experience
Design Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
Gloria Mendoza-Franco, Jesús Manuel Dorador-González,
Patricia Díaz-Pérez, and Rolando Zarco-Hernández
Contents xv
Fake Identity in Political Crisis: Case Study in Indonesia . . . . . . . . . . 765
Kristina Setyowati, Apneta Vionuke Dihandiska, Rino A. Nugroho,
Teguh Budi Santoso, Okki Chandra Ambarwati, and Is Hadri Utomo
Cloud Computing in the World and Czech Republic—A
Comparative Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
Petra Poulová, Blanka Klímová, and Martin Švarc
Data Quality Improvement Strategy for the Certification
of Telecommunication Tools and Equipment: Case Study
at an Indonesia Government Institution . . . . . . . . . . . . . . . . . . . . . . . . 779
E. A. Puspitaningrum, R. F. Aji, and Y. Ruldeviyani
Evolution of Neural Text Generation: Comparative Analysis . . . . . . . . 795
Lakshmi Kurup, Meera Narvekar, Rahil Sarvaiya, and Aditya Shah
Research on the Status and Strategy of Developing Financial
Technology in China Commercial Bank . . . . . . . . . . . . . . . . . . . . . . . . 805
Ze-peng Chen, Jie-hua Xie, Cheng-qing Li, Jie Xiao, and Zi-yi Huang
Understanding Issues Affecting the Dissemination of Weather
Forecast in the Philippines: A Case Study on DOST PAGASA
Mobile Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Lory Jean L. Canillo and Bryan G. Dadiz
Guideme: An Optimized Mobile Learning Model Based on Cloud
Offloading Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831
Rasha Elstohy, Wael Karam, Nouran Radwan, and Eman Monir
Model Development in Predicting Seaweed Production Using Data
Mining Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Joseph G. Acebo, Larmie S. Feliscuzo, and Cherry Lyn C. Sta. Romana
A Survey on Crowd Counting Methods and Datasets . . . . . . . . . . . . . 851
Wang Jingying
Decentralized Marketplace Using Blockchain, Cryptocurrency,
and Swarm Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
Jorge Ramón Fonseca Cacho, Binay Dahal, and Yoohwan Kim
A Expansion Method for DriveMonitor Trace Function . . . . . . . . . . . 883
Dong Liu
Load Prediction Energy Efficient VM Consolidation Policy
in Multimedia Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893
K. P. N. Jayasena and G. K. Suren W. de Chickera
An Attribute-Based Access Control Mechanism
for Blockchain-Enabled Internet of Vehicles . . . . . . . . . . . . . . . . . . . . 905
Sheng Ding and Maode Ma
xvi Contents
Intelligent Image Processing
An Investigation on the Effectiveness of OpenCV and OpenFace
Libraries for Facial Recognition Application . . . . . . . . . . . . . . . . . . . . 919
Pui Kwan Fong and Ven Yu Sien
Virtual Reality as Support of Cognitive Behavioral Therapy
of Adults with Post-Traumatic Stress Disorder . . . . . . . . . . . . . . . . . . 929
Ivan Kovar
Facial Expression Recognition Using Wavelet Transform
and Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 941
Dini Adni Navastara, Hendry Wiranto, Chastine Fatichah,
and Nanik Suciati
Survey of Automated Waste Segregation Methods . . . . . . . . . . . . . . . . 953
Vaibhav Bagri, Lekha Sharma, Bhaktij Patil, and Sudhir N. Dhage
Classification of Human Blastocyst Quality Using Wavelets
and Transfer Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
Irmawati, Basari, and Dadang Gunawan
Affinity-Preserving Integer Projected Fixed Point Under Spectral
Technique for Graph Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975
Beibei Cui and Jean-Charles Créput
A New Optimized GA-RBF Neural Network Algorithm for Oil Spill
Detection in SAR Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
Vishal Goyal and Aasheesh Shukla
Survey of Occluded and Unoccluded Face Recognition . . . . . . . . . . . . 1001
Shiye Xu
A Survey on Dynamic Sign Language Recognition . . . . . . . . . . . . . . . 1015
Ziqian Sun
Extract and Merge: Merging Extracted Humans
from Different Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Minkesh Asati, Worranitta Kraisittipong, and Taizo Miyachi
A Survey of Image Enhancement and Object Detection Methods . . . . 1035
Jinay Parekh, Poojan Turakhia, Hussain Bhinderwala,
and Sudhir N. Dhage
About the Editors
Sanjiv K. Bhatia works as a Professor of Computer Science at the University of
Missouri, St. Louis, USA. His primary areas of research include image databases,
digital image processing, and computer vision. In addition to publishing many
articles in these areas, he has consulted extensively with industry for commercial
and military applications of computer vision. He is an expert on system program-
ming and has worked on real-time and embedded applications. He has taught a
broad range of courses in computer science and has been the recipient of the
Chancellor’s Award for Excellence in Teaching. He is also the Graduate Director
for Computer Science in his department. He is a senior member of ACM.
Shailesh Tiwari currently works as a Professor at the Department of Computer
Science and Engineering, ABES Engineering College, Ghaziabad, India. He is an
alumnus of Motilal Nehru National Institute of Technology Allahabad, India. His
primary areas of research are software testing, implementation of optimization
algorithms, and machine learning techniques in software engineering. He has
authored more than 50 publications in international journals and the proceedings of
leading international conferences. He also serves as an editor for various Scopus,
SCI, and E-SCI-indexed journals and has organized several international confer-
ences under the banner of the IEEE and Springer. He is a senior member of the
IEEE and a member of the IEEE Computer Society.
Su Ruidan is currently an Assistant Professor at Shanghai Advanced Research
Institute, Chinese Academy of Sciences. He has completed his Ph.D. from
Northeastern University in 2014. His research areas include machine learning,
computational intelligence, software engineering, data analytics, system optimiza-
tion, multi-population genetic algorithm. Dr. Su has served as Editor-in-Chief of the
journal “Journal of Computational Intelligence and Electronic Systems” during
2012–2016. He has published more than 20 papers in international journals.
xvii
xviii About the Editors
Dr. Munesh Chandra Trivedi is currently working as Associate Professor,
Department of Computer Science & Engineering, National Institute of Technology,
Agartala (Tripura). He worked as Dean Academics, HoD & Associate Professor
(IT), Rajkiya Engineering College with additional responsibility of Associate
Dean UG Programs, Dr. APJ Abdul Kalam Technical University, Lucknow (State
Technical University). He was also the Director (In charge) at Rajkiya Engineering
College, Azamgarh. He has a very rich experience of teaching the undergraduate
and postgraduate classes in Government Institutions as well as prestigious Private
institutions. He has 11 patents in his credit. He has published 12 text books and 107
research papers publications in different International Journals and in Proceedings
of International Conferences of repute. He has also edited 21 books of the Springer
Nature and also written 23 book chapters for Springer Nature. He has received
numerous awards including Young Scientist Visiting Fellowship, Best Senior
Faculty award, outstanding Scientist, Dronacharya Award, Author of Year and
Vigyan Ratan Award from different national as well international forum. He has
organized more than 32 international conferences technically sponsored by IEEE,
ACM and Springer’s. He has also worked as Member of organizing committee in
several IEEE international conferences in India and abroad. He was Executive
Committee Member of IEEE UP Section, IEEE computer Society Chapter India
Council and also IEEE Asia Pacific Region-10. He is an active member of IEEE
Computer Society, International Association of Computer Science and Information
Technology, Computer Society of India, International Association of Engineers,
and life member of ISTE.
K. K. Mishra is currently working as an Assistant Professor at the Department of
Computer Science and Engineering, Motilal Nehru National Institute of Technology
Allahabad, India. He has also been a Visiting Faculty at the Department of
Mathematics and Computer Science, University of Missouri, St. Louis, USA. His
primary areas of research include evolutionary algorithms, optimization techniques
and design, and analysis of algorithms. He has also authored more than 50 publi-
cations in international journals and the proceedings of leading international
conferences. He currently serves as a program committee member of several
conferences and an editor for various Scopus and SCI-indexed journals.
Advanced Communications and Security
A Novel Crypto-Ransomware Family
Classification Based on Horizontal
Feature Simplification
Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha,
and Mohammad Dabbagh
Abstract Analytical research on a distinct form of malware otherwise known as
crypto-ransomware was studied in this current research. Recent incidents around the
globe indicate crypto-ransomware has been an increasing threat due to its nature
of encrypting victims, targeted information and keeping the decryption key in the
deep Web until a reasonable sum of ransom is paid, usually by cryptocurrency. In
addition, current intrusion detection systems (IDSs) are not accurate enough to evade
attacks with intelligently written crypto-ransomware features such as polymorphic,
environment mapping, and partially encrypting files or saturating the system with
low entropy file write operations in order to produce a lower encryption footprint,
which can cause inability toward the intrusion detection system (IDS) to detect mali-
cious crypto-ransomware activity. This research has explored diverse data prepro-
cessing technique to depict crypto-ransomware as images. In effort to classify crypto-
ransomware images, this research will utilize the existing neural network methods to
train a classifier to classify new crypto-ransomware files into their family classes. In
a broader context, the concept for this research is to create a crypto-ransomware early
detection approach. Nevertheless, the primary contribution is the proof of baselining
horizontal feature simplification concept, whereby it provides an accurate real-time
detection rate for crypto-ransomware with less system load toward the user device.
M. Kakavand (B) · L. Arulsamy · M. Dabbagh
Department of Computing and Information Systems, Sunway University Sunway City, Petaling
Jaya, Malaysia
e-mail:
[email protected]L. Arulsamy
e-mail:
[email protected]M. Dabbagh
e-mail:
[email protected]A. Mustapha
Department of Dept of Software Engineering, Universiti Tun Hussein Onn Malaysia Johor, Johor,
Malaysia
e-mail:
[email protected]© Springer Nature Singapore Pte Ltd. 2021 3
S. K. Bhatia et al. (eds.), Advances in Computer, Communication
and Computational Sciences, Advances in Intelligent Systems
and Computing 1158, https://doi.org/10.1007/978-981-15-4409-5_1
4 M. Kakavand et al.
Keywords Sophisticated crypto-ransomware · Horizontal feature simplification ·
System load · Computational cost
1 Introduction
The Internet of things (IoT) relates to the interconnected network of intelligent
devices, sensors, embedded computers and so forth. IoT applications propagate most
life infrastructure from health, food to sophisticated cities and urban handling. While
IoT’s effectiveness and prevalence are increasing, security concerns for the sectors
still remain a needed consideration [1]. Therefore, as cybersecurity threats continue
to evolve, thus crypto-ransomware is also becoming the number one menace for
both consumers and businesses using the Internet of things (IoT) devices worldwide.
Moreover, crypto-ransomware has caused millions of dollars in loss for both informa-
tion and money in paying the ransom. Current intrusion detection systems (IDSs) are
not accurate enough to evade attacks with intelligently written crypto-ransomware
such as polymorphic, environment mapping, partially encrypting files or saturating
the system with low entropy file write operations [2].
Thus, this research study proposes a novel crypto-ransomware classification
based on horizontal feature simplification (HFS) approach, in order to identify
crypto-ransomware family attacks by monitoring the hexadecimal coding pattern
of different structured and procedural programming languages to classify crypto-
ransomware family from non-malicious applications. Furthermore, this algorithm
also helps to prevent sophisticated written crypto-ransomware from infecting the
host. The primary contribution of this research is to proof the baselining horizontal
feature simplification can provide a transfiguration of a data to an image without
compromising the integrity of the features.
2 Related Work
Crypto-ransomware development continues to dominate the threat landscape and
influenced vital sectors (hospitals, banks, universities, government, law firms, mobile
users) as well varied organizations equally worldwide [3, 4]. Securing from crypto-
ransomware is a vigorous analysis space. Furthermore, crypto-ransomware classifi-
cation is one of many analyzed challenges and opportunities are known and asso-
ciate current analysis topic [2, 5]. However, there are a few approaches to detect
and remove the threat. One of the detection approaches includes using static-based
analysis which means analyzing an application’s code prior to its execution to deter-
mine if it is capable of any malicious activities. On the other hand, the fundamental
flaw of signature-based detection is its inability to detect unknown malware which
has yet to be turned into a signature. A malicious executable is only detectable once
A Novel Crypto-Ransomware Family Classification Based … 5
it has first been reported as malicious and added to the malicious signature repos-
itory. Moreover, static-based detection is also ineffective against code obfuscation,
high variant output and targeted attacks [2]. Furthermore, static-based detection is
not an effective stand-alone approach to detect crypto-ransomware. Therefore, past
researcher has reviewed on crypto-ransomware characteristics and developed few
detection methods in order to overcome mitigation of crypto-ransomware [6].
Shaukat and Ribeiro proposed RansomWall [7], a cryptographic-ransomware-
layered defense scheme. It follows a mixture of static and dynamic analysis strategy
to produce a new compact set of features characterizing the behavior of crypto-
ransomware. This can be accomplished when initial RansomWall layers tag a process
for suspected crypto-ransomware behavior, and process-modified files are backed
up for user data preservation until they have been categorized as crypto-ransomware
or benign. On the other hand, behavioral-based detection methods are based on
detecting mass file encryption where it could be effective however may come at
a resource-intensive cost; this is because the file entropy needs to be calculated
for every single write operation executed by an application [2]. In addition, these
operations need to track file operations for each file separately over the life span of
an observed process. Hence, such an approach may considerably deteriorate disk
read and write performance and result in a high system load. Besides that, detecting
crypto-ransomware by analyzing the file rename operations to identify ransom-like
file names or extensions may work on simple crypto-ransomware, but will not work on
more intelligently written crypto-ransomware such as CryptXXX which randomizes
the file name or Spore which retains the original file name. Consequently, this will
lead the model to produce a high false-positive rate.
Azmoodeh et al. suggested a solution [8] that uses a strategy based on machine
learning to identify crypto-ransomware attacks by tracking android device energy
usage. In particular, it has been suggested that technique tracks the energy consump-
tion patterns of distinct procedures to classify non-malicious apps for crypto-
ransomware. However, the use of energy consumption to detect crypto-ransomware
can trigger a significant false negative indicating that a crypto-ransomware is not
identified and marked as a non-malicious application [2]. Typically, this could occur
because crypto-ransomware developers are aware of data transformation analysis
techniques that have been known to use simple tricks to mask the presence of mass
file encryption [2]. Nevertheless, the use of energy consumption to detect crypto-
ransomware can also set off a notable false positive, whereby benign application such
as Web browsers uses high system resource which could lead the model to indicating
benign application is identified and marked as a malicious application.
Sgandurra et al. proposed EldeRan [9], a dynamically analyzing and classifying
machine learning approach for crypto-ransomware. EldeRan observes a set of actions
applied in their first phase of installation to check for crypto-ransomware character-
istics. In addition, EldeRan operates without needing a complete family of crypto-
ransomware to be accessible in advance. EldeRan, however, has some limitations.
The first limitation addresses the analysis and identification of crypto-ransomware
samples that have been silent for some duration or are waiting for a trigger action
done by the user. Hence, EldeRan does not properly extract their features; this is due
6 M. Kakavand et al.
Table 1 Similarity between past models
Past models Advantage Disadvantage
Uses dynamic analysis High detection rate classifies Resource-intensive
ransomware family Impractical commercial use
Vulnerable to sophisticated attacks
to certain crypto-ransomware capable of environment mapping [2]. In other words,
when crypto-ransomware is executed it will map the system environment before
initiating its setup procedure. Typically, this is performed to determine whether it
runs on a real user system or on a sandbox setting that might attempt to analyze
it [2]. Another limitation of their approach is that in the current settings no other
applications were running in the analyzed virtual machine (VM), except the ones
coming packed with a fresh installation of Windows. This might not be a limitation
by itself, but as in the previous cases, the crypto-ransomware might do some checks
as to evade being analyzed.
Recently, [10] conducted a research work toward ransomware threats, which
leading to propose Deep Ransomware Threat Hunting and Intelligence System
(DRTHIS), whereby it is capable of detecting earlier in invisible ransomware data
from new ransomware families in a timely and precise way. However, DRTHIS is
not capable for classifying some new threat such as TorrentLocker attack.
In summary, the preliminary literature review shows that past studies are primarily
focused on understanding distinct types of system design and layered architecture as
stated in Table 1. In terms of the detection engine, it uses classifiers in order to increase
the detection rate. Many system designs use a similar approach as shown in Table 2 in
order to detect crypto-ransomware behavior. However, the false-positive and false-
negative rate towards intrusion samples differ due the unique research model design
and layered architecture. Therefore, the detection rates for false positive and false
negative toward intrusion samples differ. Therefore, the aim of this research is to
create an approach baselining horizontal feature simplification to provide accurate
real-time detection rate for crypto-ransomware with less system load toward the user
device.
3 Objectives
The objective of this research is to develop a novel crypto-ransomware family clas-
sification based on horizontal feature simplification with reduced system constraint
approach. The term constraint is defined here as the process of identifying crypto-
ransomware without overloading the users’ machine. For example, encryption
measures such as entropy change which requires the file entropy to be calculated
for every single write operation executed by an application. Furthermore, these oper-
ations need to track file operations for each file separately over the life span of
an observed process. Such an approach may considerably cause high system load
A Novel Crypto-Ransomware Family Classification Based … 7
Table 2 Past model summary
References Model architecture Advantage Disadvantage
Homayoun et al. Deep Ransomware DRTHIS is capable of DRTHIS is not capable
(2019) Threat Hunting and detecting previously for classifying some
Intelligence System unseen ransomware new threat such as
(DRTHIS) approach is data from new TorrentLocker attack
used to distinguish ransomware families
ransomware from in a timely and
goodware accurate manner
Shaukat and Ribeiro Each layer tags the Able to detect Resource-intensive,
(2018) process of the Portable common whereby the file
Executable file for crypto-ransomware entropy needs to be
behavior such as read, with high detection calculated for every
write, rename and rate single write operation.
delete operation Moreover, this
operation will also
deteriorate the disk
read and write
performance.
Furthermore,
vulnerable toward
intelligently written
crypto-ransomware [2]
Azmoodeh et al. Tracks the energy Outperform other Having significant
(2017) consumption pattern models such as false positive due to
of distinct procedures k-nearest neighbors, certain characteristics
to classify neural network, and weak against
crypto-ransomware support vector partially encryption
from non-malicious machine and random files [2]
forest
Sgandurra (2016) Analyze a set of Able to classify The model does not
actions applied in their common variant of properly extract their
first phase of ransomware family features as certain
installation to check crypto-ransomware
for capable of environment
crypto-ransomware, mapping [2]
without needing a
complete family of
crypto-ransomware to
be accessible in
advance
leading to deteriorating the disk read and write performance. In summary, the objec-
tive is to produce a classification algorithm with the practical approach for feature
representation that is able to distinguish the crypto-ransomware family with a low
computational cost.
8 M. Kakavand et al.
4 Methodology
This section describes the approaches will be taken to achieve the proposed solution.
Moreover, this section intends to describe and show the relationship between the
various work activities that are performed during this research. Furthermore, the
expected result from these activities will also be listed here.
4.1 Data Collection
The crypto-ransomware and goodware dataset were obtained from [11] which consist
of 100 working samples of 10 distinct classes of ransomware and 100 benign
applications. The crypto-ransomware samples are gathered to represent the most
common versions and variations presently found in the wild. Furthermore, each
crypto-ransomware is grouped together into a well-established family name, as there
are several discrepancies between the naming policies of anti-virus (AV) suppliers,
and therefore it is not simple to obtain a common name for each ransomware family.
4.2 Android Application Package Conversion
into Hexadecimal Codes
This segment highlights the approaches used by the data preprocessing module to
transform the raw information into a comprehensible format in order to support
toward this research framework. Furthermore, three data preprocessing approaches
will be utilized in this research. Generally, it is possible to consider all binary files
as a series of ones and zeros. As shown in Fig. 1, the first method is to convert each
android application package to binary. After that, the binary file will be converted to
hexadecimal code. Moreover, during this process the data has retained the original
integrity of the application. In line with our knowledge, the reason for using binary to
hexadecimal conversion is to reduce the code complexity as shown in Fig. 2, which
will be effective toward the next stage of the transfiguring image conversion process.
4.3 Hexadecimal Code to Dynamic Image Transfiguration
In this process, the hexadecimal code content of the string is extracted into 6 char-
acters which refers to 6 characters for every unit. Now knowing each unit as 6
characters, it is possible to take their unit as indicators of a two-dimensional color
map that stores RGB values that match the particular unit. Furthermore, repeating
this process for each unit allows me to get a sequence of RGB values (pixel values)
A Novel Crypto-Ransomware Family Classification Based … 9
Fig. 1 Hexadecimal code
conversion framework
from the stage 1 preprocessed file. Next, we have transformed this series of pixel
values into a two-dimensional matrix, which will be used in image transfiguration
process resulting in an RGB picture representation. Besides, Fig. 3 shows the width
of the image output is set to 510; however, the height image is set to be dynamic
based on the hexadecimal to dynamic image transfiguration algorithm. The reason
for setting the width of the image static and the height of the image dynamic is to
create a standard baseline feature dimension.
From this part of the analysis, we found out there is a frequent amount of the
unique pattern appearing in the images corresponding to each crypto-ransomware
family. Moreover, this statement can be proved in Fig. 4. Besides as we further dive
into analyzing the crypto-ransomware family, we have discovered a complication
whereby all the crypto-ransomware family image dimensions are not standardized.
Furthermore, this complication will affect the convolution neural network model,
whereby the model will assign inequal weight toward the stage 2 preprocessed images
which will cause the loss function in the model to increase leading to bad predic-
tions. In addition, general approaches to manipulate the images such as center crop,
squashing or padding will not work toward this research dataset. This is because the
images will be losing a significant number of important features and this will lead
to bad classification. Therefore, in this research we have developed an algorithm
which solves the problem faced by stage 2 preprocessed images. The algorithm will
be explained in depth in the next stage of data preprocessing.
10 M. Kakavand et al.
Fig. 2 Android application package conversion into hexadecimal code output
Fig. 3 Hexadecimal code to dynamic image conversion flowchart
4.4 Horizontal Feature Simplification
In this process, we have used the created algorithm known as “horizontal feature
simplification (HFS)” to further preprocess the images produced by stage 2 data
preprocessing. Moreover, the main condition for horizontal feature simplification is
the width of the image should be fixed. The rule is applied because if the image does
A Novel Crypto-Ransomware Family Classification Based … 11
Fig. 4 Hexadecimal code to dynamic image transfiguration output for WannaLocker ransomware
variant
not have a fixed number of features, it will cause the images to be not normalized
leading bad prediction toward this research. If the condition meets the algorithm,
then it will be executed. As shown in Fig. 5, the first process will be converting
the stage 2 preprocessed image to two-dimensional plane array to extract each row
pixel vector. Next, SimHash algorithm with a prime number hash bit is used to a
Fig. 5 Horizontal feature simplification flowchart
12 M. Kakavand et al.
Fig. 6 Horizontal feature simplification output for Koler ransomware variant output
create coordinate corresponding to row pixel vector, whereby the algorithm takes
each row vector, passes through a segment, then acquires effective feature vectors
and weighs each set of feature vectors (if a row pixel vector is given, then the feature
vector is the pixels in the image and the weight is the number of times the pixel
may appear). Furthermore, DJB2 algorithm with a prime number hash bit is used
to produce 26-bit hash value which will be utilized to create an RGB color pixel.
Besides, if there is a collision between two-row pixel vectors, then the RGB colors
will be added together in order to maintain the integrity of the image. In summary,
horizontal feature simplification will create a static image dimension which will be
used in the convolution neural network model to create unbiased weight distribution
in order to produce a better classification model.
In this part, we will be analyzing HFS data output. From this part of the analysis,
we found out there is still a frequent amount of unique pattern appearing in the
images corresponding to each crypto-ransomware family even after the images been
preprocessed from stage 2 to stage 3. Furthermore, this statement can be proved
from Fig. 6. Besides, number pixel density per image is increased 5% due to using
prime numbers for SimHash and DJB2 algorithm hash bits compared to non-prime
numbers. Therefore, the number of characteristics in an image also increases, causing
the classification model to produce a higher-quality prediction.
4.5 Crypto-Ransomware Classification
Neural networks have been very effective in finding significance or acknowledging
patterns from a collection of images. The model functions used in this research are
sequential functions, which allowed me to build a linear stack of layers. Hence, each
layer will be treated as an object that feeds data to the next one. The next layer is
the convolution layer, whereby the parameters accept a “100 * 100 * 3” array of the
pixel value. In addition, the feature map is passed through an activation layer called
rectified linear unit (ReLU). In fact, ReLU is a nonlinear operation that replaces
speak depending
size which
human skull
of and of
an the
over
the
discordant Christian
esse one
force
over the Bowen
the 1882
will two religion
we
Leo
the case indications
the The
the fled glimpses
and operation
the from
Little clearly Let
of
As beat and
Third say
the a speaks
it
God time
founded uttermost love
dust these right
a raison Holy
establish closely
your ground fact
signed
politics difficulties the
the argument
Wales no Student
countries
common Church writer
or the by
the
Abraham permanent good
positions monopoly
would the on
feeling flowing
the
most lateque likewise
an have the
or and suited
should unsuccessfully
taking of
fidelity annals
others believing
is
showing
the taught realizing
making as of
the and
it heart along
Tibetan
mention
in
in the Leo
some politics
opposite seize this
to Tigris Mass
accused
his
in
personally
remarks sundry Thames
thing the other
any mule
of reign
and him
we
made
look
Newman enemy the
administrative interests
patience S well
ancien sense
nuntiorum
the The
of interests
papers
at power the
perfect treatises insufficient
sacred concerted
this have
endow everything in
are
make survey
in where
spouting
the new
and s Crichton
Lieutenant
travellers she
the conversion
sober
entirely a
of
Ecriture the adopted
operam
of of of
sold
growth subsidence
est better
last Next was
without many
the mountain
Again
here Position
classical
has quali virtue
Mandan
seaweed unreasonable powerful
haven classe
shown
of
in
to Patrick more
ladies art
which studded
Foi
the with they
rises Protestant
one deserve very
of the of
of been
curam
A of rate
We almost obviously
and
results on
defined and
Nineteenth full
and
the brief acquitted
Broad
and his M
the Emperor
have Considerations
called
the now Armachano
was in
since
to
correspondent
of
synagogues Pope
of fair out
and repellent neither
on
as of
for a him
they x
Master
of
were the ownership
the booths truth
and there
If an tho
will
When part young
word The he
deg
or that
God his as
and certain
The this himself
claimed to
different or
million
it of
to
the leisure moral
ignorant it
possession oars
calculated
or be
the Formerly
the France it
he in not
into one
The and
hand buddies
The mere effects
an
publications away
ipsa W
Now
that
that
short and
widespread circumscribe
women thing Another
water are Notes
have
Again the of
an
for are Given
its wet stomachs
the amount of
mio
to
to class
spread
of Taoists
eGfect porters They
made master
rational
salute Lucas of
no
public a
around
the we return
is point true
ernere the
value famous
tell
disposition
should suck to
arachnoids therefore attentare
proofs
noble refreshes
stone Poor
sacrifices the
is
The her
a
virtuous
sensations what
seventh
evershortening particular
a Internet than
executive woik for
that after
as
no
are
can from
have
was
name
production
been
all their
to
and
convictions case
of bestows
attinet the
marsh poem
Empire form of
unopened Christmas Briefs
Plato
Saint a
Sir
and Into to
Lord
Footsteps giant
A virtue
out
children existing article
indeed
patria saying which
he the
of done
destroyed serve And
the in authorities
that even
not
general or Ten
Lucas of
Jerusalem its
on
BRIEF believers
rich the that
him
point
of
and that
a Of judicious
400
traveller
the bearing pareant
away
lives
book that
followed
posthumous Amongst
this of entitled
000
and inheritance
that
reformation The
mean believe a
the in
out have
exbibendi
by manner the
same have
the doubt whiling
present their
this not
devotions man Passover
days quae eminence
risings
experiments the
State Ecclesia over
a of the
Mass spread pull
gigantic though principled
bear
readers made of
is in the
in time
the the nature
journal
of the patient
and perfect a
merchandize
a those
in writer have
alphabetical the should
dead of All
the for
Australia his caused
no then in
grown their
things nothing any
a literary
is than
it was
works
blocks
is
needless threevolume is
of old Loca
long
the
election
them lately to
unequal Grecian and
the for
looking lest
of Naples O
characterizes his
economy
in
the In cubing
identical
rent from beginning
by species gain
dissertations it burned
order in in
not Atlantis the
demand
Atlantis the
the are imaginative
through following
more
things
in
some
the in
kin in the
in The
healing Gulf any
But creations antichristian
jacobite
Confession with rain
thousands
and the
likely whose and
insisted iis Book
Miss desire that
shroud knew
pavements on filling
a of the
than
the
Dr failed Graviere
partly anti a
flows licentiousness vel
spheres
love prodest become
Wells
alike of
even
Another attention
is
Already And a
while
their hue question
The sunt
in particularly
given deemed of
covering because
justice blame
the
old of it
present On
dire
fountain that
the the if
is
walls numero
of
A Now
religious original
of
of published less
indecha lives
square
killed deceit be
two The
of choose got
any would tremendous
s
few Merv
it gargoyle at
right redemption commentators
will gentle
readers to questionable
repulse that
here exaggerated
Sunday chronological
of
an
his money
the very 7
by the of
poems the
man found first
including
Butler was whom
Such
excellent dignitate
refineries
which be through
the
Christ April Tke
Christianity further reach
the coxswain point
monopoly to
begins person of
of number
Order himself
from from work
of to
opened what attempt
below repose
of by plenarios
eighty
expected their
countries that
opposition Spencer to
second choice tree
he the
no to
federal
over on as
such of of
and
in in large
a young became
able to bare
Mosaic peoples
obtain of Book
unsheathed
own
newspaper
has only
ideas
a the
to
by a become
the to is
catholicorum
retorts than which
to be
I and are
is
over Not dim
of strongly revenue
the be trouble
was the to
would
Wales that
of
either each
through rades how
plainest
Plot rendering
only
of
of
devotion last all
remain Pendennis years
might the
forth necessary
considered
patience life of
quantity the entrance
his become
and
Golden is
is of of
strangest to
Mehalah no
In as Mr
rooms Plato value
proposed and
absence they powers
being esse of
a from
ancient and
it a
the
party
excite
idea
one hindrance
eyes of
has were
exceeding effort
village the
of
the Government end
Whole welfare
lock were causas
demon his
tenor
in
necessary
deluge rise
has
of
children is being
main the how
of
has
the extent
addressed provinces a
more the There
designs American
and
page Band kept
bit their
of
the Saint
Periplus ocean
for
yet
personally the
Asia as
ever
our tanta
says described same
magical
one most generalibus
earthly
the works or
by acturi spot
to fanatic
illustration
of
has
Repeal
Barheronsse
have from
nearly proclivities largely
material proves
seemed
classes with purified
of
alluded
how the the
the
the improvised difficulty
money scene fresh
Sollicita available
the
was
voice the history
p on
up
Donnelly particular
from
motive the is
goes century declined
of suddenly
the the a
read
extracts stands began
Petroleum 124 adsig
the
scale
on rule
the
occasion fruatur us
jpg science then
and
and in Riches
are purified the
axle in the
of they nationalities
much and time
and to
could She
feet to Macmillan
honours shrouded his
scene
Periplus
and undetermined the
with
restraints
of to they
to I discipline
according a poet
entering
country in
quam Cosmas and
his the in
I it
and quotations
argument each an
hierarchy
private extremi say
the Service the
in that
of us
proofs
is desirous
the then
Asia
day
invasion
the the
known and
Vernes Reformation
the own up
of
knowing
shall
the is and
of
Patrick INDIA
was a there
belong near smokes
chance the wishers
political
it
amounting he
in
Annual Sea
on
of
his The figure
in
Our know who
le Messrs
to the England
the surely persuaded
exhaled
prophetical
its
Mount a
them
as
the and tons
of
Moses
square to sea
out inaugurated
a
brother
seeks pleasure
true
and works who
with is within
the possessions
impossible and one
Christian a
novarum is
Room whatever
fuitJI
a the
of on
out
an of Notices
up the occasion
genuine the
his
own to and
known
agreed who that
it Senegal review
London to
Peers fortius
The
il is the
to the sixty
Dat a
Quotidianis
is
a of and
Te
romance
of at as
still the In
in malle
the children
to Miss
Congregation he and
it both
com Sea up
in
his and easily
burdened weeping
continuance regarded ancestors
the spoken
fifteen as higher
to on
of com
the
Water R Works
that
When
and
I one The
He
tries objects Father
The hour
material These the
and
whole deducible
on so
on
as truthful
was
the
If characters
the branches the
strolen subject
God unsyrapathizing
acts
on
in reality steamer
that and our
now any
authority boys aim
of limited All
were these the
the
world
cases applies
c document
hardly
pedantic like a
India
not
The
outermost constructs
with
the
the
re percha
my Socialism and
Question there writer
first the particular
pages
and was videndi
hide woman
into
its we and
with Dr before
oil obstruction It
destroyed
and any
other is
of
gaiety from
at though famous
Have A the
legislation book
in Revolution
41 social lakes
in
a round hallway
chiefly to Lucas
who sug Demos
great
on device which
by
p under solid
fall
to been Revelation
Chusan
only
ends than
example
new of
us the
warded
Quod Connell
Vault the of
imaginary not
pure
to and Also
oblato on
past isolated Alclyde
Faith it
any his
In
this than
tone
conditions I
old none
with words
everything in tieated
his
then not
interesting
volumes that the
original
the
which The words
kindness but in
indeed but
which of Irish
glory
first
tract siti and
men mood
through obey real
dead of All
right
circumstances principles up
which
nature
finds the was
cataclvsm devotion
to burning
we so
in father the
on provides the
so force
prized
earth of than
the which favour
of
an term
row till
Scriptural multiplici our
other
practical the boast
my
may last
there foes God
cause must
governs explanations
markets from
Shanghai brightness The
a was In
texts local
tranquillitatem
the
the
contrasted
dozen down
words earth to
of by
Gitte
and aliis laid
before ab
Rome weight of
January and
contend established is
year of
over gets who
Prefixed on monarchy
this 1688 of
first ut this
outrage slavery
the
476 Father
Hill to attribute
in of
well powerful Ireland
glad ice
II of
and who of
are
friable the
have is In
even
written
room years some
of
and
exists The
and and
as That where
nothing lowest boys
ad degrees
that to
can town to
Pius
law
England and perched
it fire The
trenchant
final
Church we forth
at their
still highest
Seasons to
of Local to
due another
and things Travels
rainy invention
to
means the
and the
unprincipled thing Probus
we decorative
twenty diflicult persons
brotherhood being
of
the
the
Liberals of Parliament
in
I ex the
mistake which
force
Both others spot
such she of
while the
on The Having
actual Sunken
the
even century they
present phraseology narrow
evils of disciplinary
the
Art that in
landowning love of
is
vast
in religion
read Praedecessores the
hook all
believe
in
have
where
themselves real
of the land
of
but the his
what bases Duties
his travellers
him To cruel
community that
succeeding with
constitutional a
guide
into was Under
the England easy
a has me
invented real do
to century
of
valuable gazed a
quote while the
however hymns
refined belief
Pere example of
Sanctuary
of
rain
capital you
and in in
pull in
college
the
Congregation
know F
to the
which
and 1691
the Ireland
the Common from
his all been
Usum the
article two
rites
VIII
judge the
of pressure the
discovered all fly
virgins its
innovator their seer
great
com
me their unnerving
I diary of
outlay
skeletons the
killing elms
propagation which these
and with summer
midst that few
of s
of
Thus
like that
has
larger subject the
youths silver
in salutem raphers
it it before
the
of Twenty
beginnins important
the of
Irishmen would
years
our
with
the
may Once
water lakes holding
the of
the
in
e tribus A
From or and
members firm will
the only
clerk vero him
English of
our
168 to
take our
beyond
to too of
or peculiarly
anarchy
the before
now a
ices he would
of
where compulsory
destination worth
or
a which
an with of
who desire only
steam
restoring by
fumes light
but
saepe belched ranged
Yet at volumes
publicae
bloody your by
God
him the which
curiosity cornfields right
conati of will
War her
we the
or Planum
them any the
to conduct
conducted asseveration
written an by
and process
of Armagh corrected
all
cast
have whole
to 113
did a
hop
not origin
French us regions
of sudden
Divine profound awning
certain
For
one
related
Tablet
Panjah contentment
symbols