Early Ransomware Detection with Deep Learning Models

被引:0
|
作者
Davidian, Matan [1 ]
Kiperberg, Michael [1 ]
Vanetik, Natalia [1 ]
机构
[1] Shamoon Coll Engn, Dept Software Engn, IL-84100 Beer Sheva, Israel
关键词
ransomware; deep learning; API call sequences; cybersecurity; malware detection; behavioral analysis;
D O I
10.3390/fi16080291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware is a growing-in-popularity type of malware that restricts access to the victim's system or data until a ransom is paid. Traditional detection methods rely on analyzing the malware's content, but these methods are ineffective against unknown or zero-day malware. Therefore, zero-day malware detection typically involves observing the malware's behavior, specifically the sequence of application programming interface (API) calls it makes, such as reading and writing files or enumerating directories. While previous studies have used machine learning (ML) techniques to classify API call sequences, they have only considered the API call name. This paper systematically compares various subsets of API call features, different ML techniques, and context-window sizes to identify the optimal ransomware classifier. Our findings indicate that a context-window size of 7 is ideal, and the most effective ML techniques are CNN and LSTM. Additionally, augmenting the API call name with the operation result significantly enhances the classifier's precision. Performance analysis suggests that this classifier can be effectively applied in real-time scenarios.
引用
收藏
页数:37
相关论文
共 50 条
  • [1] Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment
    Al-Hawawreh, Muna
    Sitnikova, Elena
    2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2019,
  • [2] Ransomware early detection using deep reinforcement learning on portable executable header
    XiZhen Deng
    MingCan Cen
    M. Jiang
    Meiqu Lu
    Cluster Computing, 2024, 27 : 1867 - 1881
  • [3] Ransomware early detection using deep reinforcement learning on portable executable header
    Deng, XiZhen
    Cen, MingCan
    Jiang, M.
    Lu, Meiqu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 1867 - 1881
  • [4] Explainable Ransomware Detection with Deep Learning Techniques
    Giovanni Ciaramella
    Giacomo Iadarola
    Fabio Martinelli
    Francesco Mercaldo
    Antonella Santone
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 317 - 330
  • [5] Explainable Ransomware Detection with Deep Learning Techniques
    Ciaramella, Giovanni
    Iadarola, Giacomo
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (02) : 317 - 330
  • [6] Deep Learning LSTM based Ransomware Detection
    Maniath, Sumith
    Ashok, Aravind
    Poornachandran, Prabaharan
    Sujadevi, V. G.
    Sankar, Prem A. U.
    Jan, Srinath
    2017 RECENT DEVELOPMENTS IN CONTROL, AUTOMATION AND POWER ENGINEERING (RDCAPE), 2017, : 442 - 446
  • [7] Ransomware Detection and Classification Using Machine Learning and Deep Learning
    Ouerdi, Noura
    Mejjout, Brahim
    Laaroussi, Khadija
    Kasmi, Mohammed Amine
    ADVANCES IN SMART MEDICAL, IOT & ARTIFICIAL INTELLIGENCE, VOL 1, ICSMAI 2024, 2024, 11 : 194 - 201
  • [8] Ransomware Detection using Machine and Deep Learning Approaches
    Alsaidi, Ramadhan A. M.
    Yafooz, Wael M. S.
    Alolofi, Hashem
    Taufiq-Hail, Ghilan Al-Madhagy
    Emara, Abdel-Hamid M.
    Abdel-Wahab, Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 112 - 119
  • [9] A Review on Android Ransomware Detection Using Deep Learning Techniques
    Alzahrani, Nisreen
    Alghazzawi, Daniyal
    11TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES), 2019, : 330 - 335
  • [10] A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques
    Fernando, Damien Warren
    Komninos, Nikos
    Chen, Thomas
    IOT, 2020, 1 (02): : 551 - 604