Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Ransomware Family Classification With Ensemble Model Based On Behavior Analysis

Version 1 : Received: 29 January 2022 / Approved: 31 January 2022 / Online: 31 January 2022 (11:49:48 CET)

How to cite: Tasnim, N.; Sarker, I.H. Ransomware Family Classification With Ensemble Model Based On Behavior Analysis. Preprints 2022, 2022010454 (doi: 10.20944/preprints202201.0454.v1). Tasnim, N.; Sarker, I.H. Ransomware Family Classification With Ensemble Model Based On Behavior Analysis. Preprints 2022, 2022010454 (doi: 10.20944/preprints202201.0454.v1).

Abstract

Ransomware is one of the most dangerous types of malware, which is frequently intended to spread through a network to damage the designated client by encrypting the client’s vulnerable data. Conventional signature-based ransomware detection technique falls behind because it can only detect known anomalies. When it comes to new and non-familiar ransomware traditional system unveils huge shortcomings. For detecting unknown patterns and sorts of new ransomware families,behavior-based anomaly detection approaches are likely to be the most efficient approach. In the wake of this alarming condition, this paper presents an ensemble classification model consisting of three widely used machine learning techniques that include Decision Tree (DT), RandomForest (RF), and K-nearest neighbor (KNN). To achieve the best outcome ensemble soft voting and hard voting techniques are used while classifying ransomware families based on attack attributes. Performance analysis is done by comparing our proposed ensemble models with standalone models on behavioral attributes based ransomware dataset..

Keywords

Ransomware; Behavior analysis; Cyber Security; Machine Learning; Ensemble model; Supervised classification

Subject

MATHEMATICS & COMPUTER SCIENCE, Other

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.