LightGBM-based Ransomware Detection using API Call Sequences

被引:0
作者
Duc Thang Nguyen [1 ]
Lee, Soojin [1 ]
机构
[1] Korea Natl Def Univ, Dept Comp Sci & Engn, Nonsan, South Korea
关键词
Ransomware; machine learning; API call; dynamic analysis technique; gradient boosting decision tree; GBDT; lightGBM;
D O I
10.14569/IJACSA.2021.0121016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Along with the development of technology as well as the explosion in digital data in the era of fourth industrial revolution, cyberattacks using ransomware are emerging as a serious threat to many agencies and organizations. The harm of ransomware is not limited to the areas of information technology and finance but also affects areas related to people's lives, such as the medical field. Therefore, research to identify and detect these types of malicious code is urgent. this paper present a novel approach of identifying and classifying ransomware based on dynamic analysis techniques combined with the use of machine learning algorithms. First, this research focused on the Application programming interface (API) call functions that are extracted during a dynamic analysis of executable samples using the Cuckoo sandbox. Second, research used LightGBM, a gradient boosting decision tree algorithm, for training and then detecting and classifying normal software and eight different types of ransomware. Experimental results showed that the proposed approach achieves an overall accuracy rate of 98.7% when performing multiclass classification. In particular, the detection rates of ransomware and normalware were both 99.9%. At the same time, the accuracy in identifying two specific types of ransomware, WannaCry and Win32:FileCoder, reached 100%.
引用
收藏
页码:138 / 146
页数:9
相关论文
共 18 条
[1]   A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware [J].
Almashhadani, Ahmad O. ;
Kaiiali, Mustafa ;
Sezer, Sakir ;
O'Kane, Philip .
IEEE ACCESS, 2019, 7 :47053-47067
[2]   Ransomware detection using machine learning algorithms [J].
Bae, Seong Il ;
Lee, Gyu Bin ;
Im, Eul Gyu .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
[3]  
Baldwin J, 2018, ADV INFORM SECUR, V70, P107, DOI 10.1007/978-3-319-73951-9_6
[4]   Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics [J].
Cabaj, Krzysztof ;
Gregorczyk, Marcin ;
Mazurczyk, Wojciech .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 :353-368
[5]   Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques [J].
Hwang, Jinsoo ;
Kim, Jeankyung ;
Lee, Seunghwan ;
Kim, Kichang .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) :2597-2609
[6]   SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism [J].
Jin, Dongzi ;
Lu, Yiqin ;
Qin, Jiancheng ;
Cheng, Zhe ;
Mao, Zhongshu .
COMPUTERS & SECURITY, 2020, 97
[7]  
Ke GL, 2017, ADV NEUR IN, V30
[8]   Ransomware Detection using Random Forest Technique [J].
Khammas, Ban Mohammed .
ICT EXPRESS, 2020, 6 (04) :325-331
[9]  
Kharraz A, 2015, LECT NOTES COMPUT SC, V9148, P3, DOI 10.1007/978-3-319-20550-2-1
[10]   Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems [J].
Lee, Kyungroul ;
Lee, Sun-Young ;
Yim, Kangbin .
IEEE ACCESS, 2019, 7 :110205-110215