Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment

: The internet of things (ransomware refers to a type of malware) is the concept of connecting devices and objects of all types on the internet. IoT cybersecurity is the task of protecting ecosystems and IoT gadgets from cyber threats. Currently, ransomware is a serious threat challenging the computing environment, which needs instant attention to avoid moral and ﬁnancial blackmail. Thus, there comes a real need for a novel technique that can identify and stop this kind of attack. Several earlier detection techniques followed a dynamic analysis method including a complex process. However, this analysis takes a long period of time for processing and analysis, during which the malicious payload is often sent. This study presents a new model of dwarf mongoose optimization with machine-learning-driven ransomware detection (DWOML-RWD). The presented DWOML-RWD model was mainly developed for the recognition and classiﬁcation of goodware/ransomware. In the presented DWOML-RWD technique, the feature selection process is initially carried out using an enhanced krill herd optimization (EKHO) algorithm by the use of dynamic oppositional-based learning (QOBL). For ransomware detection, DWO with an extreme learning machine (ELM) classiﬁer can be utilized. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset. The experimental results highlight the superiority of the DWOML-RWD model over other approaches.


Introduction
The internet of things (IoT) can be described as the increasing number of physical devices connected to the internet. Embedded with sensor nodes and software that can collect and share data online, IoT gadgets are invaluable in improving productivity and enhancing a massive number of processes throughout industries [1]. Inappropriately, the nature of IoT gadgets' connectivity paves the way for malicious performers to take full advantage, especially because of the top ten vulnerabilities that make IoT gadgets insecure [2]. To achieve the scalability objective of the network, research workers in the past established several clustering methods. In a clustered network, every cluster can be assigned a gateway that sends packets to and from the base station (BS), considering that a cellular structure can be utilized for providing internet access to IoT nodes [3]. A node with good resources can be selected as a gateway. Compromising or capturing the gateway will affect every node in the cluster, and, thus, gateway security assaults should be protected against attacks [4]. Invaders usually encode victims' data with their keys, and they decode the data or return the key only after the victims fulfill or pay their demands [5]. Previously, ransomware would simply disrupt the services and make the data inaccessible to the victim; until now, they were safely saved only on their system [6]. Now, data can also be stolen by attackers, and they threaten the victim to pay money. Additionally, it is not certain that the data can be retrieved when the ransom is paid or if the attackers leak the stolen data.
Ransomware is irreversible and tedious to stop, unlike other security issues. The approach of this malware depends on access limitations to user files via encryption and demands a ransom to attain the decryption key. An invader usually shows a ransom note after encoding the data of the victim, which generally indicates that the attack was executed; then, the invader demands money [7]. The attacker mentions the steps for making a payment with the ransom note that they offered. Ransomware attacks could cause trouble to the distributed IoT atmosphere and halt smooth work amongst heterogeneous data centers. Such mechanisms contain complicated structures of methods and corpora. Environments that are data centers have a huge magnitude of data and could pay money for avoiding damage to their reputation and exploitation of their data [8].
In the literature, three different studies are performed for ransomware detection: hybrid, static, and dynamic. Each analysis technique has pros and cons [9]. Dynamic analysis provides higher accuracy in detection through the execution of the samples. Deep learning (DL) and machine learning (ML) have effects on all aspects of life. Such technology has several applications in each domain because of its capability for decision making. Advanced assault and threat detection is easier and occurs in less time, because of the use of such effective technologies. DL is considered the optimal method for detecting the paradigms of an undergoing system [10].
ML and DL technologies have received considerable attention and are massively utilized in the advanced research of cybersecurity. ML technologies are utilized in the domain of ransomware detection, such as logistic regression (LR), random forest (RF), k-nearest neighbor (KNN), naïve Bayes (NB), and neural networks (NNs). In addition, DL models, such as deep neural networks (DNNs) and the deep autoencoder (AE), are also used for ransomware detection. Though several ransomware detection models are available in the literature, there is still a need to develop automated ransomware detection tools for enhanced performance. At the same time, the trial-and-error parameter-tuning process is difficult and erroneous. Therefore, a metaheuristics-based parameter-tuning process is essential.
This study presents a new model of dwarf mongoose optimization with machinelearning-driven ransomware detection (DWOML-RWD). The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the feature selection process is initially carried out using an enhanced krill herd optimization (EKHO) algorithm by the use of dynamic oppositional-based learning (QOBL). For ransomware detection, DWO with an extreme learning machine (ELM) classifier was utilized. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset.

Related Works
In [11], the authors use DL methods to extract the latent representation of a high dimension of data, which is collected for identifying malicious behavior precisely. To be specific, the method that the authors present depends on a hybrid-feature engineering method of variational and classical autoencoders. This hybrid method can be utilized for reducing the data dimension and extracts a good representation of the gathered system actions. Then, the new feature vector can be sent to a classifier that can be constructed based on batch-normalizing methods and a DNN. Aurangzeb et al. [12] develop BigRC-EML for ransomware classification and detection based on numerous dynamic and static features. The author leverage ensemble ML techniques on big data to predict the accuracy of ransomware detection. Though several ML techniques have been utilized in the identification of ransomware, the assessment of ensemble techniques has not yet been conducted. In addition, a novel feature-selecting technique related to PCA can be used to diminish the feature dimension.
Masum et al. [13] propose a feature-selection-related structure by adopting various ML methods, which include NN-related structures, to classify the security level for the prevention and detection of ransomware. The authors implement many ML techniques, namely, LR, DT, NB, NN-related classifiers, and RF, on a selected number of features for classifying ransomware. Ogundokun et al. [14] introduce an ML technique for detecting ransomware assaults on IoT gadgets. The study utilizes power for tracking and reviewing power utilization in 500 ms internals of every operating process. The paper utilizes three gadgets for performing the experiment: a projector, an android device, and a laptop computer. The method is used to monitor the power utilization of IoT gadgets utilizing several processes for the categorization of ransomware outside non-malicious functions.
The authors of [15] present a weighted minimum redundancy maximum relevance (WmRmR) method for the prediction of superior feature significance in data taken at the initial phases of ransomware assaults. The method integrates an improvised mRMR (EmRmR) with term frequency-inverse document frequency (TF-IDF); therefore, it can filter runtime and noisy conduct based on the weights computed by TF-IDF. Du et al. [16] demonstrate an intellectual KNN and density-related ML method for detecting ransomware pre-attacks on an endpoint mechanism. The feature engineering and data pre-processing methods are augmented with the KNN method to find the solution. The study of malware detection, utilizing advanced ML methods to advance highly proficient ransomware defensive solutions for the detection and prevention of ransomware pre-attack, aids endpoint security provider companies, anti-malware developers, vendors, and authors. Al-Hawawreh and Sitnikova [17] model a detection method related to stacked VAE and FC-NN, and they are able to study the latent structure of system actions and expose ransomware conduct. Moreover, the authors develop a data augmentation technique based on VAE to generate novel data that are employed in training an FC network for improvising the generalized abilities of the developed detection method.

The Proposed Model
In this article, a new DWOML-RWD method is introduced for cyberattack detection in the IoT environment. The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the EKHO algorithm is used to perform the feature selection process. For ransomware detection, DWO with an ELM classifier is used. Figure 1 shows a block diagram of the DWOML-RWD approach.

Feature Selection: EKHO Algorithm
In the presented DWOML-RWD technique, the EKHO algorithm is used to perform the feature selection process. The KHO algorithm is inspired by the herding behavior of individual krill that is expressed by random diffusion, induced movement, and foraging activity [18]. For weight optimization, we employed the KHO technique; it is able to resolve optimization problems effectively. It is the more commonly employed heuristics optimization technique. This method imitates the krill individual (KI) behavior in KH. It contains two chief goals: (1) attaining food and (2) augmenting krill density. The position of KI can be affected by the following factors: (1) random diffusion; (2) movement inspired by other KI; and (3) foraging activity. Hence, the krill position is formulated using the Lagrangian model in the following: where: -movement guided by other .
The steps are shown below.
Step 1: the motion of the direction of KI can be defined using repulsive swarm density, local swarm, and target swarm as follows: where: -maximum induced speed. -motion inertia weight within [0,1].
-last motion induced. is estimated by Equation (3) = + denotes the local effects of a neighbor of -th individuals, and represents the optimum solution direction from individuals.

Feature Selection: EKHO Algorithm
In the presented DWOML-RWD technique, the EKHO algorithm is used to perform the feature selection process. The KHO algorithm is inspired by the herding behavior of individual krill that is expressed by random diffusion, induced movement, and foraging activity [18]. For weight optimization, we employed the KHO technique; it is able to resolve optimization problems effectively. It is the more commonly employed heuristics optimization technique. This method imitates the krill individual (KI) behavior in KH. It contains two chief goals: (1) attaining food and (2) augmenting krill density. The position of KI can be affected by the following factors: (1) random diffusion; (2) movement inspired by other KI; and (3) foraging activity. Hence, the krill position is formulated using the Lagrangian model in the following: where: The steps are shown below.
Step 1: the motion of the direction of KI can be defined using repulsive swarm density, local swarm, and target swarm as follows: where: In Equation (4), I b indicates the coefficient and determined α target i for i-th individuals.
where ra refers to the random number within (0, 1).
Step 2: The foraging behavior can be estimated by where Here, Sp f denotes the foraging speed, ω f shows the inertia weight for foraging, and B best i represents the optimal solution.
Step 3: The physical diffusion of KI is an arbitrary method, and the movement related to D f i and δ is evaluated in the following expression: In Equation (8), D f i represents the maximal diffusion speed, and δ denotes the random directional vector and arrays of random numbers in (−1, 1). The movement of the krill swarm determines the procedure that identifies the optimum fitness. Hence, the KI location can be given as follows: The variable ∆t is crucial and regarded as a scaling factor of the speed vector. Hence, it should be modified regarding the optimization problem. The value of ∆t fully depends on the search space.
The EKHO algorithm was designed by using the DOBL concept. The OBL method was utilized for generating a unique opposition solution to the present solution [19]. It tries to produce the optimum solution, which leads to the speed rate of the convergences being enhanced. The opposite X 0 of a provided real number (X ∈ [U, L]) is measured as: The opposite point, X = [X 1 , X 2 , . . . , X Dim ], is a point from Dim-dimensional searching space, X 1 , X 2 , . . . , X Dim ∈ R, and X j U j , L j . Therefore, the opposite point X 0 of X is represented as: Compared with the opposite point, the dynamic opposite preference X DO of value X is defined as: where r 8 and r 9 signify the arbitrary values from the range of [0,1], and w signifies the weighted agent. Therefore, the dynamic opposite value X DO j of X is equivalent to [X 1 , X 2 , . . . , X Dim ], which is written as: Therefore, the DOBL optimizer starts by generating the primary solutions (X = (X 1 , . . . , X Dim ) and computes their dynamic opposite values X Do utilized in Equation (13). Afterward, it is dependent upon the provided fitness value.
The fitness function (FF) employed in the EKHO technique contains a balance amongst the count of selective features from every solution (minimal) and classifier accuracy (maximum) achieved by using such selective features. Equation (14) defines the FF to estimate solutions. (14) in which γ R (D) signifies the classifier error rate of a provided classification, |R| implies the cardinality of the chosen subset, and |C| indicates the entire count of features from a dataset; α, and β are two parameters corresponding to the significance of subset length and classifier quality. ∈ [1, 0] and β = 1 − α.

Ransomware Detection: ELM Model
For ransomware detection, the ELM classifier is used. In various fields, the ELM method is used for pattern recognition, wind speed forecasting, and fault diagnosis. The ELM method involves three layers: input, output, and hidden layers [20]. Figure 2 showcases the framework of ELM. By using the backpropagation model, the feedforward neural network must upgrade the weight in the iteration method; however, the ELM mechanism has a random initial weight that does not need to be upgraded in the iterative method. Consider that T = {(c i , e i )|c i ∈ R n , e i ∈ R n } denotes the training instances and F(.) indicates the activation function. The ELM method is formulated below: The computation method of ELM is given as follows: (1) Define the model sample; (2) Initialize the hidden layer threshold and input weight randomly; (3) Compute the output matrix; (4) Resolve the output weight of the hidden layer.

Parameter Optimization: DWO Algorithm
In this work, the design of the DWO algorithm aids in the optimal parameter selection of the ELM model. This model mimics the behavior of the dwarf mongoose while searching for its food. Usually, DWO initiates by fixing the first value in a sequence of Here, θ i signifies the threshold of the hidden node; α i signifies the weight linking the output and hidden nodes; ρ i shows the weight connecting the input and the hidden node; c i signifies the input sample of the module; e i denotes the output sample of models; and N s characterizes the sample count: Here, e denotes the sample label matrix; Y indicates the hidden layer output matrixes; α indicates the weight matrix; and N h shows the node count in a hidden state. The hidden layer threshold and input weight of the ELM algorithm are determined randomly. In the iteration model, the weight vector does not need to be modified; only the output weight needs to be evaluated and is given below: The ELM predictive method can be attained.
The computation method of ELM is given as follows: (1) Define the model sample; (2) Initialize the hidden layer threshold and input weight randomly; (3) Compute the output matrix; (4) Resolve the output weight of the hidden layer.

Parameter Optimization: DWO Algorithm
In this work, the design of the DWO algorithm aids in the optimal parameter selection of the ELM model. This model mimics the behavior of the dwarf mongoose while searching for its food. Usually, DWO initiates by fixing the first value in a sequence of solutions through the subsequent Equation [21]: In Equation (22), rand denotes an arbitrary value integrated within [0,1], while u j and l j indicate the limit of the search domain. The swarming of DWO comprises three groups, namely, babysitters, the alpha group, and scouts. Every group has its own means of capturing food, and this is discussed below: The fitness of every solution can be calculated when the population is introduced. Equation (23) computes the probability value for the fitness of the population, and (α) the alpha female is selected according to the probability n corresponds to the mongoose counts in the alpha group. The babysitter's number is represented as bs. Peep shows the vocalization of the leading female, which keeps the family on track. Every mongoose sleeps in the initial sleeping mounds that are fixed ∅. The DWO applies the expression for generating a candidate food location.
The sleeping mound is given as follows in every reiteration, in which phi indicates a uniform distribution random number [−1, 1].
Equation (26) encompasses the average value of the sleeping mound.
When the babysitting exchange condition is satisfied, it progresses to the scouting stage; wherever the sleeping mound or following food source is, is taken into account.

• Scouts
Since mongooses are known to not return to earlier sleeping mounds, the scout looks for the sleeping mounds, which ensures exploration. For this method, foraging and scouting are implemented simultaneously. This motion is modeled after an unsuccessful or successful search for sleeping mounds. In other words, the movement of mongooses is dependent on the overall accuracy. In that regard, if the family forages some distance, they come to a novel sleeping mound as shown below.
In Equation (27) where the variable that regulates the mongoose group collective-volitive motion is linearly reduced as the iteration progresses.
, whereby the mongoose motion to the novel sleeping mounds is defined.

• Babysitters
Usually, babysitters are small group members that remain with the young and are cycled daily to assist the alpha female (mother) in leading the remaining group on regular foraging expeditions. The fitness weight is fixed as zero, which ensures that the average weight of the alpha group is reduced in the following iteration, which obstructs the movement of the group and intensifies exploitation. Algorithm Al encompasses the pseudo-code for the proposed method.

Results and Discussion
The proposed model was simulated using a Python 3.6.5 tool on PC i5-8600k, GeForce 1050Ti 4GB, 16GB RAM, 250GB SSD, and 1TB HDD. The parameter settings are as follows: learning rate, 0.01; dropout, 0.5; batch size, 5; epoch count, 50; and activation, ReLU. The experimental assessment of the DWOML-RWD algorithm was carried out utilizing a dataset comprising 840 samples. The dataset holds 420 goodware samples and 420 ransomware samples as depicted in Table 1.      Figure 4 reports a brief ransomware classification performance of the DWOML-RWD model in terms of accu y , sens y , spec y , and F score . The results imply that the DWOML-RWD model ensured enhanced performance under both classes. For instance, on run-1, the DWOML-RWD model attained an average accu y , sens y , spec y , and F score of 98.69%, 98.69%, 98.69%, and 98.69%, respectively. Meanwhile, on run-2, the DWOML-RWD model gained an average accu y , sens y , spec y , and F score of 98.69%, 98.69%, 98.69%, and 98.69%, respectively. Furthermore, on run-3, the DWOML-RWD model achieved an average accu y , sens y , spec y , and F score of 99.17%, 99.17%, 99.17%, and 99.17%, respectively. Further, on run-4, the DWOML-RWD model acquired an average accu y , sens y , spec y , and F score of 99.05%, 99.05%, 99.05%, and 99.05%, respectively. Lastly, on run-5, the DWOML-RWD model obtained an average accu y , sens y , spec y , and F score of 99.40%, 99.40%, 99.40%, and 99.40%, respectively.  Figure 5 demonstrates the detailed ransomware classification performance of the DWOML-RWD approach in terms of FNR and FPR. The results denote that the DWOML-RWD approach ensured enhanced performance under both classes. For example, on run-1, the DWOML-RWD model attained an average FNR and FPR of 1.31% and 1.31%, respectively. In parallel, on run-2, the DWOML-RWD model obtained an average FNR and FPR of 1.31% and 1.31%, respectively. Additionally, on run-3, the DWOML-RWD model gained an average FNR and FPR of 0.83% and 0.83%, respectively. Further, on run-4, the DWOML-RWD model reached an average FNR and FPR of 0.95% and 0.95%, respectively. Lastly, on run-5, the DWOML-RWD model obtained an average FNR and FPR of 0.60% and 0.60%, respectively. Appl. Sci. 2022, 12, x FOR PEER REVIEW 12 of 19  Figure 5 demonstrates the detailed ransomware classification performance of the DWOML-RWD approach in terms of FNR and FPR. The results denote that the DWOML--RWD approach ensured enhanced performance under both classes. For example, on run-1, the DWOML-RWD model attained an average FNR and FPR of 1.31% and 1.31%, respectively. In parallel, on run-2, the DWOML-RWD model obtained an average FNR and FPR of 1.31% and 1.31%, respectively. Additionally, on run-3, the DWOML-RWD model gained an average FNR and FPR of 0.83% and 0.83%, respectively. Further, on run-4, the DWOML-RWD model reached an average FNR and FPR of 0.95% and 0.95%, respectively. Lastly, on run-5, the DWOML-RWD model obtained an average FNR and FPR of 0.60% and 0.60%, respectively. The training accuracy (TRA) and validation accuracy (VLA) acquired by using the DWOML-RWD approach on the test dataset are exemplified in Figure 6. The experimental outcome represented by the DWOML-RWD technique attained higher values of TRA and VLA. Seemingly, the VLA is greater than TRA. The training accuracy (TRA) and validation accuracy (VLA) acquired by using the DWOML-RWD approach on the test dataset are exemplified in Figure 6. The experimental outcome represented by the DWOML-RWD technique attained higher values of TRA and VLA. Seemingly, the VLA is greater than TRA. The training accuracy (TRA) and validation accuracy (VLA) acquired by using the DWOML-RWD approach on the test dataset are exemplified in Figure 6. The experimental outcome represented by the DWOML-RWD technique attained higher values of TRA and VLA. Seemingly, the VLA is greater than TRA. The training loss (TRL) and validation loss (VLL) attained by using the DWOML-RWD method on the test dataset are exhibited in Figure 7. The experimental outcome      A brief ROC analysis of the DWOML-RWD approach on the test dataset is portrayed in Figure 9. The results imply that the DWOML-RWD method displayed an ability to categorize distinct classes on the test dataset. A brief ROC analysis of the DWOML-RWD approach on the test dataset is portrayed in Figure 9. The results imply that the DWOML-RWD method displayed an ability to categorize distinct classes on the test dataset.  Table 3 presents the ransomware detection results of the DWOML-RWD model compared with other ML models. These results indicate that the DWOML-RWD model displays better performance than the other methods [22]. Figure 10 provides a comparative and inspection of the DWOML-RWD technique with other existing approaches. The figure reveals that the DWOML-RWD model showed improved perfor-  Table 3 presents the ransomware detection results of the DWOML-RWD model compared with other ML models. These results indicate that the DWOML-RWD model displays better performance than the other methods [22]. Figure 10 provides a comparative sens y and spec y inspection of the DWOML-RWD technique with other existing approaches. The figure reveals that the DWOML-RWD model showed improved performance in all aspects. For instance, based on sens y , the DWOML-RWD approach gained enhanced sens y of 99.40%, whereas the Adaboost-M1, bagging, ROF, RF, and DT methodologies resulted in lower sens y values of 94.60%, 93.80%, 96.90%, 99.21%, and 98.12%, respectively.  Figure 11 provides a comparative FNR and FPR inspection of the DWOML-RW algorithm with other existing approaches. The figure reveals that the DWOML-RW model shows improved performance in all aspects. For instance, based on FNR, t DWOML-RWD approach attained a minimal FNR of 0.60%, whereas the Adaboost-M bagging, ROF, RF, and DT models resulted in increased FNR values of 5.40%, 6.20 3.10%, 0.79%, and 1.88, respectively. Additionally, based on PNR, the DWOML-RWD a proach gained a minimal PNR of 0.60%, whereas the Adaboost-M1, bagging, ROF, R and DT techniques resulted in increased PNR values of 5%, 3.50%, 2.60%, 1.30%, and 1.4 respectively. From these results, it was confirmed that the DWOML-RWD model assur enhanced performance. Figure 10. Sens y and Spec y analysis of DWOML-RWD approach with existing algorithms. Based on spec y , the DWOML-RWD method gained enhanced spec y of 99.40%, whereas the Adaboost-M1, bagging, ROF, RF, and DT algorithms resulted in lower spec y values of 95%, 96.50%, 97.40%, 98.70%, and 98.51%, respectively. Figure 11 provides a comparative FNR and FPR inspection of the DWOML-RWD algorithm with other existing approaches. The figure reveals that the DWOML-RWD model shows improved performance in all aspects. For instance, based on FNR, the DWOML-RWD approach attained a minimal FNR of 0.60%, whereas the Adaboost-M1, bagging, ROF, RF, and DT models resulted in increased FNR values of 5.40%, 6.20%, 3.10%, 0.79%, and 1.88, respectively. Additionally, based on PNR, the DWOML-RWD approach gained a minimal PNR of 0.60%, whereas the Adaboost-M1, bagging, ROF, RF, and DT techniques resulted in increased PNR values of 5%, 3.50%, 2.60%, 1.30%, and 1.49, respectively. From these results, it was confirmed that the DWOML-RWD model assured enhanced performance.
Appl. Sci. 2022, 12, x FOR PEER REVIEW 16 of Figure 10. and analysis of DWOML-RWD approach with existing algorithms. Bas on , the DWOML-RWD method gained enhanced of 99.40%, whereas the Adaboo M1, bagging, ROF, RF, and DT algorithms resulted in lower values of 95%, 96.50%, 97.40 98.70%, and 98.51%, respectively. Figure 11 provides a comparative FNR and FPR inspection of the DWOML-RW algorithm with other existing approaches. The figure reveals that the DWOML-RW model shows improved performance in all aspects. For instance, based on FNR, t DWOML-RWD approach attained a minimal FNR of 0.60%, whereas the Adaboost-M bagging, ROF, RF, and DT models resulted in increased FNR values of 5.40%, 6.20 3.10%, 0.79%, and 1.88, respectively. Additionally, based on PNR, the DWOML-RWD a proach gained a minimal PNR of 0.60%, whereas the Adaboost-M1, bagging, ROF, R and DT techniques resulted in increased PNR values of 5%, 3.50%, 2.60%, 1.30%, and 1.4 respectively. From these results, it was confirmed that the DWOML-RWD model assur enhanced performance.

Conclusions
In this article, a new DWOML-RWD method was introduced for cyberattack detection in the IoT environment. The presented DWOML-RWD model was mainly developed for the recognition and classification of goodware/ransomware. In the presented DWOML-RWD technique, the EKHO algorithm was used to perform the feature selection process. For ransomware detection, DWO with an ELM classifier was used. The design of the DWO algorithm aids in the optimal parameter selection of the ELM model. The experimental validation of the DWOML-RWD method can be examined on a benchmark dataset. The experimental outcomes highlight the superiority of the DWOML-RWD model over other approaches. Thus, the DWOML-RWD approach can be utilized for ransomware detection in a real-time IoT-cloud environment. In the future, the DWOML-RWD model can be extended to the integration of hybrid deep learning models.