Sorting Ransomware from Malware Utilizing Machine Learning Methods with Dynamic Analysis

被引:1
|
作者
Krishnan, Vinay [1 ]
Schoenbachler, Joshua [2 ]
Agarwal, Garvit [2 ]
Li, Feng [2 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] Indiana Univ Purdue Univ Indianapolis, Indianapolis, IN USA
基金
美国国家科学基金会;
关键词
Dynamic Analysis; Malware; Ransomware; Benignware; Cuckoo Sandbox; Graph Learning; Machine Learning; Neural Networks;
D O I
10.1145/3565287.3617632
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware attacks have grown significantly in the past dozen years and have disrupted businesses that engage with personal data. In this paper, we discuss the identification of ransomware, malware, and benign software from one another using machine learning techniques. We collected data samples from repositories on the internet as well as referencing a dataset from a previous study that provided a basis for our approach. We collected ransomware, malware, and benign software samples manually using Cuckoo Sandbox (TM). We filtered on certain feature groups to test and determine if certain activity/processes in the infection process could be used to correctly distinguish ransomware from malware and benign software. These feature groups represent correlated processes within a running application: network activity, registry/events processes, and file interactions. The datasets were analyzed using several machine learning (ML) models which included Random Forest, Support Vector Machines (SVM), Gradient Boosting, and Decision Trees using binary classification. The best classifiers for distinctly identifying ransomware from benign software were Random Forest and SVM with an f1-score of 86% and an f1-score of 82% as well as an 85% in overall accuracy for Random Forest. In addition to ransomware versus benign software, we also compared malware software to ransomware data. Yielding a 100% accuracy in performance, Gradient Boosting Classifier and Decision Trees were the best at distinguishing ransomware from malware software. This high result may partially be caused by a smaller malware and ransomware dataset. Overall, we were able to successfully distinguish ransomware from malware and benign software.
引用
收藏
页码:516 / 521
页数:6
相关论文
共 50 条
  • [31] Analysis of Ransomware Impact on Android Systems using Machine Learning Techniques
    Al-Ruwili, Anfal Sayer M.
    Mostafa, Ayman Mohamed
    [J]. International Journal of Advanced Computer Science and Applications, 2023, 14 (11): : 775 - 785
  • [32] Static Malware Analysis Using Machine and Deep Learning
    Singh, Himanshu Kumar
    Singh, Jyoti Prakash
    Tewari, Anand Shanker
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 437 - 446
  • [33] Ransomware Detection Service: Execution and Analysis Using Machine Learning Techniques
    Badrinath, Suriya
    Dodhi, Roshni
    Muthalagu, Raja
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (02) : 995 - 1009
  • [34] Ransomware Detection Service: Execution and Analysis Using Machine Learning Techniques
    Suriya Badrinath
    Roshni Dodhi
    Raja Muthalagu
    [J]. Wireless Personal Communications, 2023, 133 : 995 - 1009
  • [35] Analysis of Ransomware Impact on Android Systems using Machine Learning Techniques
    Al-Ruwili, Anfal Sayer M.
    Mostafa, Ayman Mohamed
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 775 - 785
  • [36] Detection of different windows PE malware using machine learning methods
    Kocak, Aynur
    Sogut, Esra
    Alkan, Mustafa
    Erdem, O. Ayhan
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2023, 26 (03): : 1185 - 1197
  • [37] A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware
    Hasan, Hayyan Salman
    Deeb, Hasan Muhammad
    Ladani, Behrouz Tork
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 59 - 71
  • [38] Applying machine learning classifiers to dynamic Android malware detection at scale
    Amos, Brandon
    Turner, Hamilton
    White, Jules
    [J]. 2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1666 - 1671
  • [39] Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning
    de Wit, J. S. Panman
    Bucur, D.
    van der Ham, J.
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (02):
  • [40] Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
    Yaokumah, Winfred
    Appati, Justice Kwame
    Kumah, Daniel
    [J]. INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2021, 15 (04)