Ransomware Family Classification with Ensemble Model Based on Behavior Analysis

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ransomware is one of the most dangerous types of malware, which is frequently intended to spread through a network to damage the designated client by encrypting the client’s vulnerable data. Conventional signature-based ransomware detection technique falls behind because it can only detect known anomalies. When it comes to new and non-familiar ransomware traditional system unveils huge shortcomings. For detecting unknown patterns and sorts of new ransomware families, behavior-based anomaly detection approaches are likely to be the most efficient approach. In the wake of this alarming condition, this paper presents an ensemble classification model consisting of three widely used machine learning techniques that include decision tree (DT), random forest (RF), and K-nearest neighbor (KNN). To achieve the best outcome, ensemble soft voting and hard voting techniques are used while classifying ransomware families based on attack attributes. Performance analysis is done by comparing our proposed ensemble models with standalone models on behavioral attributes-based ransomware dataset.

Cite

CITATION STYLE

APA

Tasnim, N., Shahriar, K. T., Alqahtani, H., & Sarker, I. H. (2022). Ransomware Family Classification with Ensemble Model Based on Behavior Analysis. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 132, pp. 609–619). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-2347-0_48

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free