Ransomware Detection and Classification Using Machine Learning and Deep Learning

被引:1
作者
Ouerdi, Noura [1 ]
Mejjout, Brahim [1 ]
Laaroussi, Khadija [2 ]
Kasmi, Mohammed Amine [2 ]
机构
[1] Mohammed First Univ, ACSA Lab, Oujda, Morocco
[2] Mohammed First Univ, LARI Lab, Oujda, Morocco
来源
ADVANCES IN SMART MEDICAL, IOT & ARTIFICIAL INTELLIGENCE, VOL 1, ICSMAI 2024 | 2024年 / 11卷
关键词
Ransomware; Cybersecurity; Machine Learning; Deep Learning; LSTM; Random Forest; XGBoost; LightGBM; Classification; Prediction;
D O I
10.1007/978-3-031-66850-0_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the face of escalating ransomware threats, robust detection and classification methodologies are critical for safeguarding digital ecosystems. This study employs a comprehensive approach, combining advanced machine learning and deep learning (ML & DL) techniques, to enhance ransomware detection. Utilizing LSTM networks for deep learning and some methods such as Random Forest (RF), XGBoost, and LightGBM for machine learning-based classification, our models analyze subtle patterns indicative of ransomware behavior. By accurately classifying instances as benign or malicious, these models enable proactive defense measures. The results of this paper affirm the efficacy of our techniques and LSTM networks in enhancing ransomware detection and prediction capabilities, fortifying resilience against evolving cyber threats.
引用
收藏
页码:194 / 201
页数:8
相关论文
共 11 条
[1]   Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time [J].
Akhtar, Muhammad Shoaib ;
Feng, Tao .
SYMMETRY-BASEL, 2022, 14 (11)
[2]   Ransomware detection using machine learning algorithms [J].
Bae, Seong Il ;
Lee, Gyu Bin ;
Im, Eul Gyu .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
[3]   A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques [J].
Fernando, Damien Warren ;
Komninos, Nikos ;
Chen, Thomas .
IOT, 2020, 1 (02) :551-604
[4]  
Kunku K., 2024, IEEE Xplore, DOI [10.1109/SSCI52147.2023.10371924, DOI 10.1109/SSCI52147.2023.10371924]
[5]  
Madani Houria, 2021, Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). Advances in Intelligent Systems and Computing (AISC 1383), P790, DOI 10.1007/978-3-030-73689-7_75
[6]   Classification of ransomware using different types of neural networks [J].
Madani, Houria ;
Ouerdi, Noura ;
Boumesaoud, Ahmed ;
Azizi, Abdelmalek .
SCIENTIFIC REPORTS, 2022, 12 (01)
[7]  
Maniath S, 2017, 2017 RECENT DEVELOPMENTS IN CONTROL, AUTOMATION AND POWER ENGINEERING (RDCAPE), P442, DOI 10.1109/RDCAPE.2017.8358312
[8]  
Money, 2024, Plane Detection Dataset
[9]  
Rathore Hemant, 2018, Big Data Analytics. 6th International Conference, BDA 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11297), P402, DOI 10.1007/978-3-030-04780-1_28
[10]   Detecting Ransomware using Support Vector Machines [J].
Takeuchi, Yuki ;
Sakai, Kazuya ;
Fukumoto, Satoshi .
47TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP '18), 2018,