Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions

被引:10
作者
Ispahany, Jamil [1 ,2 ]
Islam, Md. Rafiqul [1 ,3 ]
Islam, Md. Zahidul [1 ,2 ]
Khan, M. Arif [1 ,2 ]
机构
[1] Cyber Secur Cooperat Res Ctr CSCRC, Kingston, ACT 2600, Australia
[2] Charles Sturt Univ, Sch Comp Math & Engn, Bathurst, NSW 2795, Australia
[3] Charles Sturt Univ, Sch Comp Math & Engn, Thurgoona, NSW 2640, Australia
关键词
Ransomware detection; machine learning; deep learning; early detection; real-time detection; survey; TAXONOMY; THREATS; SYSTEM;
D O I
10.1109/ACCESS.2024.3397921
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly. Unfortunately, this increased online activity has provided cybercriminals numerous opportunities to carry out devastating attacks. One recent method employed by malicious actors involves infecting corporate networks with ransomware to extract millions of dollars in profits. Ransomware falls into the category of malware. It works by encrypting sensitive data and demanding payments from victims to receive the encryption keys necessary for decrypting their data. The prevalence of this type of attack has prompted governments and organisations worldwide to intensify their efforts to combat ransomware. In response, the research community has also focused on ransomware detection, leveraging technologies such as machine learning. Despite this increased attention, practical solutions for real-world applications remain scarce in the existing literature. Numerous surveys have explored literature within the domain. Still, there is a notable lack of emphasis on the design of ransomware detection systems and the practical aspects of detection, including real-time and early detection. Against this backdrop, our review delves into the existing literature on ransomware detection, specifically examining the machine-learning techniques, detection approaches, and designs employed. Finally, we highlight the limitations of prior studies and propose future research directions in this crucial area.
引用
收藏
页码:68785 / 68813
页数:29
相关论文
共 179 条
[1]   Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection [J].
Abbasi, Muhammad Shabbir ;
Al-Sahaf, Harith ;
Mansoori, Masood ;
Welch, Ian .
APPLIED SOFT COMPUTING, 2022, 121
[2]  
Abrams L., 2020, Lockbit Ransomware Self-Spreads to Quickly Encrypt 225 Systems
[3]  
Abrams L.., 2022, Lockbit 3.0 Introduces the First Ransomware Bug Bounty Program
[4]  
Abt Sebastian, 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). Proceedings, P40, DOI 10.1109/BADGERS.2014.11
[5]   High Performance Classification Model to Identify Ransomware Payments for Heterogeneous Bitcoin Networks [J].
Abu Al-Haija, Qasem ;
Alsulami, Abdulaziz A. .
ELECTRONICS, 2021, 10 (17)
[6]   Malware Dynamic Analysis Evasion Techniques: A Survey [J].
Afianian, Amir ;
Niksefat, Salman ;
Sadeghiyan, Babak ;
Baptiste, David .
ACM COMPUTING SURVEYS, 2020, 52 (06)
[7]   Peeler: Profiling Kernel-Level Events to Detect Ransomware [J].
Ahmed, Muhammad Ejaz ;
Kim, Hyoungshick ;
Camtepe, Seyit ;
Nepal, Surya .
COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 :240-260
[8]   A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection [J].
Ahmed, Yahye Abukar ;
Kocer, Baris ;
Huda, Shamsul ;
Al-rimy, Bander Ali Saleh ;
Hassan, Mohammad Mehedi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167
[9]   Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :476-491
[10]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166