Ransomware Detection using ML

Authors

  • Ujjwal Singh Amity School of Engineering & Technology, Amity University Uttar Pradesh, Lucknow, India
  • Dr P. Singh Amity School of Engineering & Technology, Amity University Uttar Pradesh, Lucknow, India

DOI:

https://doi.org/10.54060/a2zjournals.jase.71

Keywords:

Machine Learning, Random Forest, Support Vector Machine, XGBoost, Cybersecurity

Abstract

This study investigates the effectiveness of three machine learning classifi-ers—Random Forest, SVM, and XGBoost—in detecting benign files using a dataset of file features. The dataset is cleaned by removing rows with missing values and du-plicates, followed by feature scaling with StandardScaler. Correlation heatmaps and confusion matrix visualizations are used to explore data relationships and model performance. The classifiers are trained and evaluated based on accuracy, precision, recall, F1-score, and ROC-AUC. Results indicate the comparative performance of each model, highlighting their strengths and weaknesses in distinguishing between benign and non-benign files. This comprehensive approach provides insights into the most suitable classifier for this specific detection task.

Downloads

Download data is not yet available.

References

A. Bensalah, “ransomware detection data set.” 31-Jul-2022.

F. Noorbehbahani, F. Rasouli, and M. Saberi, “Analysis of machine learning techniques for ransomware detection,” in 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), 2019.

U. Zahoora, A. Khan, M. Rajarajan, S. H. Khan, M. Asam, and T. Jamal, “Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier,” Sci. Rep., vol. 12, no. 1, pp. 1–15, 2022.

Machinelearningmastery.com [Online]. Available: https://machinelearningmastery.com/save-gradient-boosting-models-xgboost-python/. [Accessed: 20-Apr-2024].

A. Bendovschi, “Cyber-Attacks - Trends, Patterns and Security Countermeasures,” Procedia Economics and Finance, pp. 24–31, 2015.

K. Cabaj, Z. Kotulski, B. Księżopolski, and W. Mazurczyk, “Cybersecurity: trends, issues, and challenges,” EURASIP Journal on Information Security, 2018.

S. Kumar and V. Somani, “Social Media Security Risks, Cyber Threats and Risks Prevention and Mitigation Tech-niques,” International Journal of Advance Research in Computer Science and Management, vol. 4, no. 4, pp. 125–129, 2018.

Downloads

Published

2024-11-25

How to Cite

[1]
Ujjwal Singh and Dr P. Singh, “Ransomware Detection using ML”, J. Appl. Sci. Educ., vol. 4, no. 3, pp. 1–13, Nov. 2024.

CITATION COUNT

Issue

Section

Research Article