Enhancing File Entropy Analysis to Improve Machine Learning Detection Rate of Ransomware

被引:11
|
作者
Hsu, Chia-Ming [1 ]
Yang, Chia-Cheng [1 ]
Cheng, Han-Hsuan [1 ]
Setiasabda, Paul E. [1 ]
Leu, Jenq-Shiou [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect & Comp Engn, Taipei 10607, Taiwan
关键词
Ransomware; Cryptography; Feature extraction; Entropy; Support vector machines; Encryption; Analytical models; Machine learning; ransomware; entropy; security;
D O I
10.1109/ACCESS.2021.3114148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal data on a computer and transmitting it through the Internet. Cybersecurity will be an important issue that everyone continues to pay attention to. One of the most serious problems recently is the prevalence of ransomware, especially crypto-ransomware. Unlike ordinary attacks, crypto-ransomware does not control the victim's computer and steal important data. It focuses on encrypting all data and asking victims to provide ransom to decrypt the data. Currently, many studies focus on various aspects of ransomware, including file-based, behavior-based, and network-based ransomware detection method, and use machine learning to build detection models. In addition to the above research, we found that attackers have begun to develop a new method to encrypt data. It will not only increase the speed of data encryption but also reduce the detection rate in the existing detection system. In any case, we are still facing ransomware dangers, as it is hard to recognize and forestall ransomware executing obscure malicious programs. In other words, user data will be sabotaged as soon as the computer cannot detect the ransomware. To solve the problem, detecting files instead of detecting the executable program might be helpful to establish the backup system immediately before ransomware encrypts all of the user files. We analyze the 22 formats of the encrypted files, extract the specific features and use the Support Vector Machine to distinguish between encrypted and unencrypted files. Conducted analysis results confirm that our method has better performance and a higher detection rate, reaching 85.17%. (Where the detection rate of SVM kernel Trick (Poly) exceeds 92%).
引用
收藏
页码:138345 / 138351
页数:7
相关论文
共 50 条
  • [21] Ransomware Detection in Executable Files Using Machine Learning
    Ganta, Venkata Gopi
    Harish, G. Venkata
    Kumar, V. Prem
    Rao, G. Rama Koteswar
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS ON ELECTRONICS, INFORMATION, COMMUNICATION & TECHNOLOGY (RTEICT-2020), 2020, : 282 - 286
  • [22] Ransomware Detection using Machine and Deep Learning Approaches
    Alsaidi, Ramadhan A. M.
    Yafooz, Wael M. S.
    Alolofi, Hashem
    Taufiq-Hail, Ghilan Al-Madhagy
    Emara, Abdel-Hamid M.
    Abdel-Wahab, Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 112 - 119
  • [23] Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic
    Berrueta, Eduardo
    Morato, Daniel
    Magana, Eduardo
    Izal, Mikel
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 209
  • [24] DDoS attack detection in SDN: Enhancing entropy-based detection with machine learning
    Santos-Neto, Marcos J.
    Bordim, Jacir L.
    Alchieri, Eduardo A. P.
    Ishikawa, Edison
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (11):
  • [25] Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic
    Berrueta, Eduardo
    Morato, Daniel
    Magaña, Eduardo
    Izal, Mikel
    Expert Systems with Applications, 2022, 209
  • [26] Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis
    Albin Ahmed, Amnah
    Shaahid, Afrah
    Alnasser, Fatima
    Alfaddagh, Shahad
    Binagag, Shadha
    Alqahtani, Deemah
    SENSORS, 2024, 24 (01)
  • [27] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Hwang, Jinsoo
    Kim, Jeankyung
    Lee, Seunghwan
    Kim, Kichang
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2597 - 2609
  • [28] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Jinsoo Hwang
    Jeankyung Kim
    Seunghwan Lee
    Kichang Kim
    Wireless Personal Communications, 2020, 112 : 2597 - 2609
  • [29] RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique
    Sharma, Shweta
    Krishna, C. Rama
    Kumar, Rakesh
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 37
  • [30] Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPU
    Sharma, Shweta
    Krishna, C. Rama
    Kumar, Rakesh
    2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,