Enhanced Ransomware Detection Techniques using Machine Learning Algorithms

G. Usha, P. Madhavan, Meenalosini Vimal Cruz, N. A. S. Vinoth, Veena, Maria Nancy
{"title":"Enhanced Ransomware Detection Techniques using Machine Learning Algorithms","authors":"G. Usha, P. Madhavan, Meenalosini Vimal Cruz, N. A. S. Vinoth, Veena, Maria Nancy","doi":"10.1109/ICCCT53315.2021.9711906","DOIUrl":null,"url":null,"abstract":"A challenge that governments, enterprises as well as individuals are constantly facing is the growing threat of ransomware attacks. Ransomware is a type of malware that encrypts the user's files and then demands a huge sum of money from the user. This increasing complexity calls for more advancement and innovative ideas in defensive strategies used to tackle the problems. In this paper, firstly we discuss the existing research in the field of ransomware detection techniques and their shortcomings. Secondly, a juxtaposed study on various machine learning algorithms to detect ransomware attacks is compared for ransomware dataset. Thirdly, various behavioral data such as API Calls, Target files, Registry Operations, Signature, Network Accesses are collected for each ransomware and benign sample and the results are compared for various attributes to understand the behavior of the attack. In order to understand the behavior of the attack various Machine Learning Algorithms like KNN, Naïve Bayes, Random Forest, Decision Trees are used for training and testing the dataset.. Further optimization was done using hyper parameters to control the learning process. Finally, we have used the model(s) Accuracy, F1 Score, Precision and Recall to compare the results observed and suggesting how the roadmap for how efficiently the attacks can be prevented in future.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT53315.2021.9711906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

A challenge that governments, enterprises as well as individuals are constantly facing is the growing threat of ransomware attacks. Ransomware is a type of malware that encrypts the user's files and then demands a huge sum of money from the user. This increasing complexity calls for more advancement and innovative ideas in defensive strategies used to tackle the problems. In this paper, firstly we discuss the existing research in the field of ransomware detection techniques and their shortcomings. Secondly, a juxtaposed study on various machine learning algorithms to detect ransomware attacks is compared for ransomware dataset. Thirdly, various behavioral data such as API Calls, Target files, Registry Operations, Signature, Network Accesses are collected for each ransomware and benign sample and the results are compared for various attributes to understand the behavior of the attack. In order to understand the behavior of the attack various Machine Learning Algorithms like KNN, Naïve Bayes, Random Forest, Decision Trees are used for training and testing the dataset.. Further optimization was done using hyper parameters to control the learning process. Finally, we have used the model(s) Accuracy, F1 Score, Precision and Recall to compare the results observed and suggesting how the roadmap for how efficiently the attacks can be prevented in future.
使用机器学习算法的增强勒索软件检测技术
勒索软件攻击的威胁日益严重,这是政府、企业和个人不断面临的挑战。勒索软件是一种恶意软件,它对用户的文件进行加密,然后向用户索要巨额赎金。这种日益增加的复杂性要求在用于解决问题的防御战略上有更多的进步和创新思想。本文首先讨论了勒索软件检测技术领域的现有研究及其不足。其次,针对勒索软件数据集,对检测勒索软件攻击的各种机器学习算法进行了并置研究。第三,收集每个勒索软件和良性样本的API调用、目标文件、注册表操作、签名、网络访问等各种行为数据,并对结果进行各种属性的比较,以了解攻击行为。为了理解攻击的行为,各种机器学习算法,如KNN, Naïve贝叶斯,随机森林,决策树被用于训练和测试数据集。利用超参数控制学习过程进行进一步优化。最后,我们使用模型(s)准确性,F1分数,精度和召回率来比较观察到的结果,并建议如何有效地防止未来的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信