Javascript must be enabled to continue!
Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices
View through CrossRef
Ransomware remains one of the most destructive forms of cyberattacks, increasingly targeting mobile, IoT, and embedded systems with limited computational capabilities. Traditional deep learning–based ransomware detection solutions impose heavy computational overhead and are unsuitable for devices operating with constrained memory, battery, and processing power. This study proposes a lightweight machine learning framework designed to detect ransomware in real time using low-latency, low-complexity classifiers optimized for resource-constrained devices. Using the CIC-Ransomware 2020 dataset, which contains network-flow features of multiple ransomware families, six lightweight models Logistic Regression (LR), Naïve Bayes (NB), k-Nearest Neighbors (kNN), Support Vector Machine (SVM-linear), Decision Tree (DT), and Random Forest (RF-light) were trained and evaluated. Feature reduction was performed using Mutual Information and Recursive Feature Elimination to limit the model to 12 optimal features suitable for edge deployment. Experimental results show that the optimized Random Forest and Logistic Regression models achieve high accuracy (97.8% and 94.6%), low inference time (<3 ms), and small memory footprints (<1.2 MB), demonstrating suitability for real-time ransomware detection on IoT gateways, smartphones, and microcontrollers. The results highlight that lightweight ML approaches when optimized can effectively secure edge devices without requiring heavy deep learning models.
Newport Institute of Communications and Economics, Karachi
Title: Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices
Description:
Ransomware remains one of the most destructive forms of cyberattacks, increasingly targeting mobile, IoT, and embedded systems with limited computational capabilities.
Traditional deep learning–based ransomware detection solutions impose heavy computational overhead and are unsuitable for devices operating with constrained memory, battery, and processing power.
This study proposes a lightweight machine learning framework designed to detect ransomware in real time using low-latency, low-complexity classifiers optimized for resource-constrained devices.
Using the CIC-Ransomware 2020 dataset, which contains network-flow features of multiple ransomware families, six lightweight models Logistic Regression (LR), Naïve Bayes (NB), k-Nearest Neighbors (kNN), Support Vector Machine (SVM-linear), Decision Tree (DT), and Random Forest (RF-light) were trained and evaluated.
Feature reduction was performed using Mutual Information and Recursive Feature Elimination to limit the model to 12 optimal features suitable for edge deployment.
Experimental results show that the optimized Random Forest and Logistic Regression models achieve high accuracy (97.
8% and 94.
6%), low inference time (<3 ms), and small memory footprints (<1.
2 MB), demonstrating suitability for real-time ransomware detection on IoT gateways, smartphones, and microcontrollers.
The results highlight that lightweight ML approaches when optimized can effectively secure edge devices without requiring heavy deep learning models.
Related Results
Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats. Antivirus software is frequently ineffective against zero-day malware and ransomware att...
Ransomware Classification with Deep Neural Network and Bi-LSTM
Ransomware Classification with Deep Neural Network and Bi-LSTM
Malicious attacks, malware, and ransomware families present essential risks to cybersecurity and may result in significant harm to computer systems, data clusters, networks, and mo...
KRDroid: Ransomware-Oriented Detector for Mobile Devices Based on Behaviors
KRDroid: Ransomware-Oriented Detector for Mobile Devices Based on Behaviors
Ransomware has become a serious threat on Android and new cases of ransomware are continuously growing. Most existing ransomware detectors use sensitive text or APIs to detect rans...
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND
As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Ransomware Early Detection using Machine Learning Approach and Pre-Encryption Boundary Identification
Ransomware Early Detection using Machine Learning Approach and Pre-Encryption Boundary Identification
The escalating ransomware threat has catalysed the formation of a sophisticated network of cybercriminal enterprises. Addressing this issue, our research provides a detailed explor...
Ransomware Classification Using BTLS Algorithm and Machine Learning Approaches
Ransomware Classification Using BTLS Algorithm and Machine Learning Approaches
Abstract
Ransomware attacks have become one of the most severe threats in cybersecurity, causing significant financial and operational damage to organisations worldwide. Th...
Effects of Ransomware: Analysis, Challenges and Future Perspective
Effects of Ransomware: Analysis, Challenges and Future Perspective
This review paper highlights the challenges and best practices in malware analysis, specifically focusing on the age of ransomware. It provides an overview of malware and its impac...
AI-enhanced Defense Against Ransomware Within the Organization’s Architecture
AI-enhanced Defense Against Ransomware Within the Organization’s Architecture
Ransomware is a type of revenue-generating tactic that cybercriminals utilize to improve their income. Businesses have spent billions of dollars recovering control of their resourc...

