Classifying Ransomware Using Machine Learning Algorithms

被引:5
作者
Egunjobi, Samuel [1 ]
Parkinson, Simon [1 ]
Crampton, Andrew [1 ]
机构
[1] Univ Huddersfield, Sch Comp & Engn, Dept Comp Sci, Huddersfield HD1 3DH, W Yorkshire, England
来源
INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING (IDEAL 2019), PT II | 2019年 / 11872卷
关键词
Ransomware; Malware; Machine Learning; MALWARE; CLASSIFICATION;
D O I
10.1007/978-3-030-33617-2_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ransomware is a continuing threat and has resulted in the battle between the development and detection of new techniques. Detection and mitigation systems have been developed and are in wide-scale use; however, their reactive nature has resulted in a continuing evolution and updating process. This is largely because detection mechanisms can often be circumvented by introducing changes in the malicious code and its behaviour. In this paper, we demonstrate a classification technique of integrating both static and dynamic features to increase the accuracy of detection and classification of ransomware. We train supervised machine learning algorithms using a test set and use a confusion matrix to observe accuracy, enabling a systematic comparison of each algorithm. In this work, supervised algorithms such as the Naive Bayes algorithm resulted in an accuracy of 96% with the test set result, SVM 99.5%, random forest 99.5%, and 96%. We also use Youden's index to determine sensitivity and specificity.
引用
收藏
页码:45 / 52
页数:8
相关论文
共 20 条
[1]   Profiling and classifying the behavior of malicious codes [J].
Alazab, Mamoun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 :91-102
[2]   Malware classification using self organising feature maps and machine activity data [J].
Burnap, Pete ;
French, Richard ;
Turner, Frederick ;
Jones, Kevin .
COMPUTERS & SECURITY, 2018, 73 :399-410
[3]   Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware [J].
Das, Sanjeev ;
Liu, Yang ;
Zhang, Wei ;
Chandramohan, Mahintham .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :289-302
[4]   Investigation of Feature Selection Methods for Android Malware Analysis [J].
Deepa, K. ;
Radhamani, G. ;
Vinod, P. .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :841-848
[5]   THE STANDARD ERROR OF A WEIGHTED MEAN CONCENTRATION .1. BOOTSTRAPPING VS OTHER METHODS [J].
GATZ, DF ;
SMITH, L .
ATMOSPHERIC ENVIRONMENT, 1995, 29 (11) :1185-1193
[6]  
Grant L., 2018, Guide to Vulnerability Analysis for Computer Networks and System. An Artificial Intelligent Approach, P317
[7]   Classification of malware based on integrated static and dynamic features [J].
Islam, Rafiqul ;
Tian, Ronghua ;
Batten, Lynn M. ;
Versteeg, Steve .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) :646-656
[8]  
Kumar A., 2017, Journal of King Saud University-Computer and Information Sciences
[9]   ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences [J].
Lu, Huabiao ;
Wang, Xiaofeng ;
Zhao, Baokang ;
Wang, Fei ;
Su, Jinshu .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) :1140-1154
[10]   Machine learning aided Android malware classification [J].
Milosevic, Nikola ;
Dehghantanha, Ali ;
Choo, Kitn-Kwang Raymond .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 61 :266-274