Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning

View through CrossRef
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats. Antivirus software is frequently ineffective against zero-day malware and ransomware attacks; consequently, significant network infections could result in substantial data loss. Such attacks are also becoming more dynamic and capable of altering their signatures, resulting in a race to the bottom regarding weaponry. Cryptographic ransomware exploits crypto-viral extortion techniques. The malware encrypts the victim's data and demands payment in exchange. The attacker would release the data decryption key after accepting payment. After data encryption, the user has two options: pay the ransom or lose the data. Cryptographic ransomware causes damage that is nearly impossible to undo. Detection at an early stage of a ransomware attack's lifecycle is vital for preventing unintended consequences for the victim. Most ransomware detection technologies concentrate on detection during encryption and post-attack stages. Due to the absence of early behaviour signs, it is challenging to detect ransomware before it begins the unwanted process of mass file encryption. This study examines the relationship between API calls pattern and their nature to determine whether it is ransomware early behaviour. The purpose of this paper is to determine whether this technique can be used to early detect the presence of ransomware activity on a Windows endpoint. 582 ransomware samples that consist of ten ransomware families and 942 benign software samples were analysed. This study proposed RENTAKA, a novel framework for the early detection of cryptographic ransomware. It makes use of characteristics acquired from ransomware behaviour and machine learning. This study presented an algorithm to generate a ransomware pre-encryption dataset. This study, which includes six machine-learning models, gives satisfactory results in detecting cryptographic ransomware. The features used in this research were among the 232 features identified in Windows API calls. Five standard machine learning classifiers were employed in this experiment: Naive Bayes, k-nearest neighbours (kNN), Support Vector Machines (SVM), Random Forest, and J48. In our tests, SVM fared the best, with an accuracy rate of 93.8% and an area under the curve (AUC) of 0.979, respectively. The results indicate that we can distinguish ransomware from benign applications with low false-positive and false-negative rates.
Title: Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Description:
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats.
Antivirus software is frequently ineffective against zero-day malware and ransomware attacks; consequently, significant network infections could result in substantial data loss.
Such attacks are also becoming more dynamic and capable of altering their signatures, resulting in a race to the bottom regarding weaponry.
Cryptographic ransomware exploits crypto-viral extortion techniques.
The malware encrypts the victim's data and demands payment in exchange.
The attacker would release the data decryption key after accepting payment.
After data encryption, the user has two options: pay the ransom or lose the data.
Cryptographic ransomware causes damage that is nearly impossible to undo.
Detection at an early stage of a ransomware attack's lifecycle is vital for preventing unintended consequences for the victim.
Most ransomware detection technologies concentrate on detection during encryption and post-attack stages.
Due to the absence of early behaviour signs, it is challenging to detect ransomware before it begins the unwanted process of mass file encryption.
This study examines the relationship between API calls pattern and their nature to determine whether it is ransomware early behaviour.
The purpose of this paper is to determine whether this technique can be used to early detect the presence of ransomware activity on a Windows endpoint.
582 ransomware samples that consist of ten ransomware families and 942 benign software samples were analysed.
This study proposed RENTAKA, a novel framework for the early detection of cryptographic ransomware.
It makes use of characteristics acquired from ransomware behaviour and machine learning.
This study presented an algorithm to generate a ransomware pre-encryption dataset.
This study, which includes six machine-learning models, gives satisfactory results in detecting cryptographic ransomware.
The features used in this research were among the 232 features identified in Windows API calls.
Five standard machine learning classifiers were employed in this experiment: Naive Bayes, k-nearest neighbours (kNN), Support Vector Machines (SVM), Random Forest, and J48.
In our tests, SVM fared the best, with an accuracy rate of 93.
8% and an area under the curve (AUC) of 0.
979, respectively.
The results indicate that we can distinguish ransomware from benign applications with low false-positive and false-negative rates.

Related Results

API Offshore Structure Standards: 2006 And Beyond
API Offshore Structure Standards: 2006 And Beyond
Abstract The future of the API offshore structure standards appears to be at a crossroad. The short term plans are clearly laid out, with the projected publicatio...
Effects of Ransomware: Analysis, Challenges and Future Perspective
Effects of Ransomware: Analysis, Challenges and Future Perspective
This review paper highlights the challenges and best practices in malware analysis, specifically focusing on the age of ransomware. It provides an overview of malware and its impac...
A Proposed Methodology to Mitigate the Ransomware Attack
A Proposed Methodology to Mitigate the Ransomware Attack
Now a day’s network security becomes more important to organizations, government offices. With the fast advancement of the innovation, assaults throughout the years have turned out...
Optimizing Blockchain-Based Cybersecurity Systems to Strengthen Resilience Against Ransomware Attacks : A Systematic Literature Review
Optimizing Blockchain-Based Cybersecurity Systems to Strengthen Resilience Against Ransomware Attacks : A Systematic Literature Review
This study aims to address the challenges and propose solutions for the Optimization of Blockchain-Based Cybersecurity Systems to Enhance Resilience Against Ransomware Attacks usin...
Animal Alarm Calls
Animal Alarm Calls
Alarm calls are broadly defined as calls occurring in a predator context. Alarm calls have been the subject of intense scrutiny in animal communication research, as they are releva...
ARIR: An Intent Recognition-Based Approach for API Recommendation
ARIR: An Intent Recognition-Based Approach for API Recommendation
Abstract With the prevalence of service composition, how to recommend API services that meet the Mashup requirements for developers has become a challenging in the field of...
Enhancing Cybersecurity: Comparative Insights in Machine Learning Models for Ransomware Detection
Enhancing Cybersecurity: Comparative Insights in Machine Learning Models for Ransomware Detection
Ransomware is a new cybersecurity attack with huge financial and operational impact in industries globally. In this paper, an investigation of utilizing machine learning algorithms...
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...

Back to Top