Ransomware Detection Service: Execution and Analysis Using Machine Learning Techniques

被引:1
作者
Badrinath, Suriya [1 ]
Dodhi, Roshni [1 ]
Muthalagu, Raja [1 ]
机构
[1] Birla Inst Technol & Sci Pilani, Dept Comp Sci, Dubai Campus, Dubai, U Arab Emirates
关键词
Ransomware; Windows file share; Ransomware detection service; Local drives; Encryption; Machine learning;
D O I
10.1007/s11277-023-10801-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network security faces an escalating threat from hacker attacks due to the proliferation and extensive adoption of computer and internet technology. Ransomware, a prevalent form of malicious software, is frequently employed in cyberattacks to deceive victims into revealing their confidential and sensitive data. Consequently, victims may find themselves unable to retrieve their data unless they yield to ransom demands for stolen files or information. To tackle these challenges, a range of countermeasures and strategies have been devised. In this experiment, A Ransomware Detection Service first exposes all current and upcoming ransomware in Windows file shares. This system helps to detect when/where ransomware has shot Windows file shares or local drives. This system doesn't avoid ransomware viruses, instead it trains or informs operators to not remove the files that are duplicated from the "SourcePath". The "Find Ransomware Files" tab facilitates determining harm affected by a prior uncaught virus. "Audit Files" tab will navigate a directory, parallel file signatures for required file extensions, and build an authenticated files list, unauthenticated files list (likely corrupted/encrypted files), undetermined files list, and forbidden files list. These lists are compiled to form a dataset with 50 feature columns and a Classifier to train a Machine Learning model to predict future Phishing and Ransomware attacks. A Logistic Regression and Random Forest Classifier achieve an accuracy of 98% in predicting unseen file shares, which makes this method a popular one to consider in the realm of Ransomware Detection. Our aim is to highlight vital defense upgrade in machine learning-centered methods for ransomware detection before utilization in the wild. Our outcomes and findings should put appropriate inquiries for supporters such as how machine learning prototypes can be made more flexible for strong implementation of security goals.
引用
收藏
页码:995 / 1009
页数:15
相关论文
共 15 条
[1]  
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[2]  
[Anonymous], 2016, INT C BROADB WIR COM
[3]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[4]  
Baldwin J, 2018, ADV INFORM SECUR, V70, P107, DOI 10.1007/978-3-319-73951-9_6
[5]   Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning [J].
Daku, Hajredin ;
Zavarsky, Pavol ;
Malik, Yasir .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :1560-1564
[6]   Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection [J].
Ferrante, Alberto ;
Malek, Miroslaw ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Milosevic, Jelena .
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 :242-258
[7]   Ransomware Detection Considering User's Document Editing [J].
Honda, Toshiki ;
Mukaiyama, Kohei ;
Shirai, Takeharu ;
Ohki, Tetsushi ;
Nishigaki, Masakatsu .
PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, :907-914
[8]  
Kharraz A, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P757
[9]  
Kiraz M. S., 2017, CRYPTOLOGY EPRINT AR
[10]  
Ravi Nishkam., 2005, Proceedings of the Seventeenth Conference on Innovative Applications of Artificial IntelligenceIAAI, P1541, DOI [DOI 10.5555/1620175.1620274, 10.5555/1620092.1620107]