Abstract
Background Ransomware is a special kind of malware which is rapidly blooming around the world in different forms. In recent times, Ransomware plays havoc in individual and corporate systems heavily and claimed abundant amount of money as ransom in the form of crypto currency. And it’s growth is gallo** in fast pace due to the Ransomware-as-a-service facility. So it is imperative to mitigate ransomware and its attacks on an emergency basis. Aim The objective of this work is to study about the research works exclusively done for ransomware attacks and to analyze the scope and challenges of Machine Learning methods in ransomware detection. Methodology The research works exclusively aimed at the mitigation of ransomware are collected from various renowned research databases and a systematic literature study is performed based on the traits of ransomware, data sets and methods, various performance measures used in the implementation of detection models. Results Many detection models that are developed with high accuracy have been discussed. Out of them, most of the models employ Machine Learning techniques for detection of ransomware as it facilitates automated detection. The proportion of the count (37.5%) of Machine Learning based models is considerably higher than that of other models (3% each).The vital role of Machine Learning in develo** automated detection tool is reviewed from different perspectives and the limitations of Machine Language based model are also discussed. Conclusion Based on the survey, Machine Learning methods can be applied to develop automated detection tool if the challenges are properly addressed. This will be helpful to the researchers to build a comprehensive and efficient model for ransomware detection, based on Machine Learning.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adamu U, Awan I (2019) Ransomware prediction using supervised learning algorithms. In: 2019 7th international conference on future internet of things and cloud (FiCloud). IEEE, Istanbul, Turkey
Agrawal R, Stokes JW, Selvaraj K, Marinescu M (2019) Attention in recurrent neural networks for ransomware detection. ICASSP 2019–2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, Brighton, United Kingdom, pp 3222–3226
Ahmed YA, Koçer B, Huda S, Al-Rimy BAS, Hassan MM (2020) A system call refinement-based enhanced minimum redundancy maximum relevance method for ransomware early detection. J Netw Comput Appl 167:102753. https://doi.org/10.1016/j.jnca.2020.102753
Akcora CG, Li Y, Gel YR, Kantarcioglu M (2020) Bitcoinheist: topological data analysis for ransomware prediction on the bitcoin blockchain. In: Proceedings of the twenty-ninth international joint conference on artificial intelligence. Yokohama, Japan, international Joint Conferences on Artificial Intelligence Organization, pp 4439–4445
Al-Hawawreh M, Sitnikova E (2019) Leveraging deep learning models for ransomware detection in the industrial internet of things environment. 2019 military communications and information systems conference (MilCIS). IEEE, Canberra, Australia, pp 1–6
Al-rimy B, Maarof M, Mohd Shaid SZ (2019) Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2019.06.005
Al-rimy B, Maarof M, Shaid S (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74. https://doi.org/10.1016/j.cose.2018.01.001
Al-rimy BAS, Maarof MA, Shaid SZM (2018) A 0-day aware crypto-ransomware early behavioral detection framework. In: Saeed F, Gazem N, Patnaik S, Balaid A, Mohammed F (eds) Recent trends in information and communication technology, vol 5. Springer International Publishing, Cham, pp 758–766
Alhawi OM, Baldwin J, Dehghantanha A (2019) Leveraging machine learning techniques for windows ransomware network traffic detection. In: Dehghantanha A, Conti M, Dargahi T (eds) Cyber threat intelligence, vol 70. Springer International Publishing, Cham, pp 93–106
Almashhadani AO, Kaiiali M, Sezer S, O’Kane P (2019) A multi-classifier network-based crypto ransomware detection system: a case study of locky ransomware. IEEE Access 7:47053–47067. https://doi.org/10.1109/ACCESS.2019.2907485
Alotaibi FM, Vassilakis VG (2021) SDN-based detection of self-propagating ransomware: the case of badrabbit. IEEE Access 9:28039–28058. https://doi.org/10.1109/ACCESS.2021.3058897
Alrawashdeh K, Purdy C (2018) Ransomware detection using limited precision deep learning structure in FPGA. NAECON 2018–IEEE national aerospace and electronics conference. IEEE, Dayton, OH, pp 152–157
AlSabeh A, Safa H, Bou-Harb E, Crichigno J (2020) Exploiting ransomware paranoia for execution prevention. ICC 2020–2020 IEEE international conference on communications (ICC). IEEE, Dublin, Ireland, pp 1–6
Alshaikh H, Ramadan N, Hefny H (2020) Ransomware prevention and mitigation techniques. Int J Comput Appl 117:31–39. https://doi.org/10.5120/ijca2020919899
Alzahrani N, Alghazzawi D (2019) A review on android ransomware detection using deep learning techniques. In: Proceedings of the 11th international conference on management of digital ecosystems. ACM, Limassol Cyprus, pp 330–335
Arabo A, Dijoux R, Poulain T, Chevalier G (2020) Detecting ransomware using process behavior analysis. Procedia Comput Sci 168:289–296. https://doi.org/10.1016/j.procs.2020.02.249
Atapour-Abarghouei A, Bonner S, McGough AS (2019) A king’s ransom for encryption: ransomware classification using augmented one-shot learning and bayesian approximation. 2019 IEEE international conference on big data. IEEE, Los Angeles, CA, USA, pp 1601–1606
Ayub MA, Continella A, Siraj A (2020) An i/o request packet (IRP) driven effective ransomware detection scheme using artificial neural network. IEEE, Las Vegas, NV, USA, pp 319–324
Azeez NA, Odufuwa OE, Misra S, Oluranti J, Damaševičus R (2021) Windows pe malware detection using ensemble learning. Informatics 8(1). https://www.mdpi.com/2227-9709/8/1/10
Azmoodeh A, Dehghantanha A, Conti M, Choo KKR (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Human Comput 9. https://doi.org/10.1007/s12652-017-0558-5
Bae S, Lee G, Im EG (2019) Ransomware detection using machine learning algorithms. Concurr Comput: Pract Exp 32:e5422. https://doi.org/10.1002/cpe.5422
Baek S, Jung Y, Mohaisen A, Lee S, Nyang D (2018) SSD-insider: internal defense of solid-state drive against ransomware with perfect data recovery. 2018 IEEE 38th international conference on distributed computing systems (ICDCS). IEEE, Vienna, pp 875–884
Baek S, Jung Y, Mohaisen D, Lee S, Nyang D (2021) SSD-assisted ransomware detection and data recovery techniques. IEEE Trans Comput 70(10):1762–1776. https://doi.org/10.1109/TC.2020.3011214
Baldwin J, Dehghantanha A (2018) Leveraging support vector machine for opcode density based detection of crypto-ransomware. In: Dehghantanha A, Conti M, Dargahi T (eds) Cyber threat intelligence, vol 70. Springer International Publishing, Cham, pp 107–136
Bansal C, Deligiannis P, Maddila C, Rao N (2020) Studying ransomware attacks using web search logs. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval. ACM, Virtual Event China, pp 1517–1520
Berrueta E, Morato D, Magaña E, Izal M (2020) Open repository for the evaluation of ransomware detection tools. IEEE Access 8:65658–65669. https://doi.org/10.1109/ACCESS.2020.2984187
Bhateja V, Peng SL (2021) Suresh chandra satapathy. In: Zhang YD (ed) Evolution in computational intelligence: frontiers in intelligent computing: theory and applications (FICTA), vol 1, 1176. Springer, Singapore
Bibi I, Akhunzada A, Malik J, Ahmed G, Raza M (2019) An effective android ransomware detection through multi-factor feature filtration and recurrent neural network, pp 1–4. https://doi.org/10.1109/UCET.2019.8881884
Black P, Sohail A, Gondal I, Kamruzzaman J, Vamplew P, Watters P (2020) Api based discrimination of ransomware and benign cryptographic programs. In: Yang H, Pasupa K, Leung AS, Kwok J, Chan J, King I (eds) Neural information processing, vol 12533. Springer International Publishing, Cham, pp 177–188
Borah P, Bhattacharyya DK, Kalita JK (2020) Cost effective method for ransomware detection- an ensemble approach. In: Distributed computing and internet technology, pp 203–219. Springer International Publishing. https://doi.org/10.1007/978-3-030-65621-8_13
Cabaj K, Gregorczyk M, Mazurczyk W (2016) Software-defined networking-based crypto ransomware detection using http traffic characteristics. Comput Electr Eng 66. https://doi.org/10.1016/j.compeleceng.2017.10.012
Castillo PA, Laredo JLJ, Fernández F (2020) Applications of evolutionary computation. In: Vega (ed) 23rd European conference, EvoApplications, held as part of EvoStar 2020. Proceedings, vol 12104. Springer International Publishing, Seville, Spain
Chadha S, Kumar U (2017) Ransomware: let’s fight back! 2017 international conference on computing, communication and automation (ICCCA). IEEE, Greater Noida, pp 925–930
Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn GJ (2018) Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans Inf Forensics Secur 13(5):1286–1300. https://doi.org/10.1109/TIFS.2017.2787905
Chen L, Yang CY, Paul A, Sahita R (2018) Towards resilient machine learning for ransomware detection. ar**v preprint ar**v:1812.09400
Chen Q, Islam SR, Haswell H, Bridges RA (2019) Automated ransomware behavior analysis—pattern extraction and early detection. In: Science of cyber security, pp 199–214. Springer International Publishing. https://doi.org/10.1007/978-3-030-34637-9_15
Cheng L, Leung ACS (2018) In: Ozawa S (ed) Neural information processing: 25th international conference, ICONIP 2018, Siem Reap. Proceedings, Part VI, vol 11306. Springer International Publishing, Cambodia
Cimitile A, Mercaldo F, Nardone V, Santone A, Visaggio CA (2018) Talos: no more ransomware victims with formal methods. Int J Inf Secur 17. https://doi.org/10.1007/s10207-017-0398-5
Connolly Y, Lena SD (2019) Wall.“the rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures.” Comput Secur 87(101568). https://doi.org/10.1016/j.cose.2019.101568
Cusack G, Michel O, Keller E (2018) Machine learning-based detection of ransomware using sdn. In: Proceedings of the 2018 ACM international workshop on security in software defined networks & network function virtualization. ACM, Tempe, AZ, USA, pp 1–6
Cuzzocrea A, Martinelli F, Mercaldo F (2018) A novel structural-entropy-based classification technique for supporting android ransomware detection and analysis. 2018 IEEE international conference on fuzzy systems (FUZZ-IEEE). IEEE, Rio de Janeiro, pp 1–7
Daku H, Zavarsky P, Malik Y (2018) Behavioral-based classification and identification of ransomware variants using machine learning. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE), pp 1560–1564. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00224
Dargahi T, Dehghantanha A, Nikkhah P, Conti M, Bianchi G, Benedetto L (2019) A cyber-kill-chain based taxonomy of crypto-ransomware features. J Comput Virol Hacking Tech 15. https://doi.org/10.1007/s11416-019-00338-7
Dion Y, Brohi S (2020) An experimental study to evaluate the performance of machine learning algorithms in ransomware detection. J Eng Sci Technol 15:967–981
Faris H, Habib M, Almomani I, Eshtay M, Aljarah I (2020) Optimizing extreme learning machines using chains of salps for efficient android ransomware detection. Appl Sci 10(11). https://www.mdpi.com/2076-3417/10/11/3706
Fernando DW, Komninos N, Chen T (2020) A study on the evolution of ransomware detection using machine learning and deep learning techniques. IoT 1(2):551–604. https://www.mdpi.com/2624-831X/1/2/30
Fernández Maimó L, Huertas Celdrán A, Perales Gómez NL, García Clemente FJ, Weimer J, Lee I (2019) Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments. Sensors 19(5). https://www.mdpi.com/1424-8220/19/5/1114
Ferrante A, Malek M, Martinelli F, Mercaldo F, Milosevic J (2017) Extinguishing ransomware-A hybrid approach to android ransomware detection. In: Imine A, Fernandez J, Marion JY, Logrippo L, Garcia-Alfaro J (eds) Lecture notes in computer science, vol 10723. Springer International Publishing, Cham, pp 242–258
Gharib A, Ghorbani A (2017) DNA-droid: a real-time android ransomware detection framework. In: Yan Z, Molva R, Mazurczyk W, Kantola R (eds) Lecture notes in computer science, vol 10394. Springer International Publishing, Cham, pp 184–198
Gowtham R, Menen A (2020) Automated dynamic approach for detecting ransomware using finite-state machine. Decis Support Syst 138:113400. https://doi.org/10.1016/j.dss.2020.113400
Gupta BB, Perez GM, Agrawal DP, Gupta D (eds) Handbook of computer networks and cyber security: principles and paradigms. Springer International Publishing, Cham
Hampton N, Baig Z, Zeadally S (2018) Ransomware behavioural analysis on windows platforms. J Inf Secur Appl 40:44–51. https://doi.org/10.1016/j.jisa.2018.02.008
Harikrishnan N, Soman K (2018) Detecting ransomware using gurls. 2018 second international conference on advances in electronics, computers and communications (ICAECC). IEEE, Bangalore, pp 1–6
Hasan MM, Rahman MM (2017) Ranshunt: a support vector machines based ransomware analysis framework with integrated feature set. 2017 20th international conference of computer and information technology (ICCIT). IEEE, Dhaka, pp 1–7
Herrera Silva JA, Barona L, Valdivieso L, Alvarez M (2019) A survey on situational awareness of ransomware attacks-detection and prevention parameters. Remote Sens 11:1168. https://doi.org/10.3390/rs11101168
Homayoun S, Dehghantanha A, Ahmadzadeh M, Hashemi S, Khayami R (2020) Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. IEEE Trans Emerg Top Comput 8(2):341–351. https://doi.org/10.1109/TETC.2017.2756908
Hu JW, Zhang Y, Cui YP (2020) Research on android ransomware protection technology. J Phys: Conf Ser 1584(012004). https://doi.org/10.1088/1742-6596/1584/1/012004
Humayun M, Jhanjhi N, Alsayat A, Ponnusamy V (2021) Internet of things and ransomware: evolution, mitigation and prevention. Egypt Inform J 22(1):105–117
Hwang J, Kim J, Lee S, Kim K (2020) Two-stage ransomware detection using dynamic analysis and machine learning techniques. Wirel Pers Commun 112:1–13. https://doi.org/10.1007/s11277-020-07166-9
J, Z, M, H, Y, K, A, I (2020) In: Evaluation to classify Ransomware variants based on correlations between APIs. In Proceedings of the 6th International conference on information systems Security and Privacy, vol 1, pp 465–472. https://doi.org/10.5220/0008959904650472
Kara I, Aydos M (2020) Cyber fraud: Detection and analysis of the crypto-ransomware. 2020 11th IEEE Annual ubiquitous computing, electronics & mobile communication conference (UEMCON). IEEE, New York, NY, USA, pp 0764–0769
Karimi A, Moattar MH (2017) Android ransomware detection using reduced opcode sequence and image similarity. 2017 7th international conference on computer and knowledge engineering (ICCKE). IEEE, Mashhad, pp 229–234
Khammas BM (2020) Ransomware detection using random forest technique. ICT Express 6(4):325–331
Khan F, Ncube C, Ramasamy LK, Kadry S, Nam Y (2020) A digital DNA sequencing engine for ransomware detection using machine learning. IEEE Access 8:119710–119719. https://doi.org/10.1109/ACCESS.2020.3003785
Kharraz A, Robertson W, Kirda E (2018) Protecting against ransomware: a new line of research or restating classic ideas? IEEE Secur Priv 16(3):103–107. https://doi.org/10.1109/MSP.2018.2701165
Kitchenham B, Pearl Brereton O, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—A systematic literature review. Inf Softw Technol 51(1):7–15 (2009). https://doi.org/10.1016/j.infsof.2008.09.009. https://www.sciencedirect.com/science/article/pii/S0950584908001390 (special Section—Most Cited Articles in 2002 and Regular Research Papers)
Kok S, Abdullah A, Jhanjhi N (2020) Early detection of crypto-ransomware using pre-encryption detection algorithm. J King Saud Univ Comput Inf Sci
Kok S, Abdullah A, Zaman N, Supramaniam M (2019) Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers 8:79. https://doi.org/10.3390/computers8040079
Koli, J.D.: Randroid: Android malware detection using random machine learning classifiers. In: 2018 technologies for smart-city energy security and power (ICSESP). pp 1–6 (2018). https://doi.org/10.1109/ICSESP.2018.8376705
Lachtar N, Ibdah D, Bacha A (2019) The case for native instructions in the detection of mobile ransomware. IEEE Lett Comput Soc 2(2):16–19. https://doi.org/10.1109/LOCS.2019.2918091
Lee K, Lee SY, Yim K (2019) Machine learning based file entropy analysis for ransomware detection in backup systems. IEEE Access 7:110205–110215. https://doi.org/10.1109/ACCESS.2019.2931136
Li Z, Rios ALG, Trajkovic L (2020) Detecting internet worms, ransomware, and blackouts using recurrent neural networks. 2020 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, Toronto, ON, Canada, pp 2165–2172
Lokuketagoda B, Weerakoon MP, Kuruppu UM, Senarathne AN, Abeywardena KY (2018) R-killer: an email based ransomware protection tool. In: 2018 13th international conference on computer science & education (ICCSE). Colombo. IEEE
Lu T, Zhang L, Wang S, Gong Q (2017) Ransomware detection based on v-detector negative selection algorithm. 2017 international conference on security, pattern analysis, and cybernetics (SPAC). IEEE, Shenzhen, pp 531–536
Luhach AK, Kosa JA, Poonia RC (2020) **ao-zhi Gao. In: Singh D (ed) First international conference on sustainable technologies for computational intelligence: proceedings of ICTSCI 2019, vol 1045. Springer, Singapore, Singapore
Maigida AM, Abdulhamid SM, Olalere M, Alhassan JK (2019) Haruna chiroma, and emmanuel gbenga dada.“systematic literature review and metadata analysis of ransomware attacks and detection mechanisms.” J Reliab Intell Environ 5(2):67–89. https://doi.org/10.1007/s40860-019-00080-3
Manavi F, Hamzeh A (2020) A new method for ransomware detection based on PE header using convolutional neural networks. 2020 17th international ISC conference on information security and cryptology (ISCISC). IEEE, Tehran, Iran, pp 82–87
Manzano C, Meneses C, Leger P (2020) An empirical comparison of supervised algorithms for ransomware identification on network traffic. 2020 39th international conference of the chilean computer science society (SCCC). IEEE, Coquimbo, Chile, pp 1–7
Medhat M, Gaber S, Abdelbaki N (2018) A new static-based framework for ransomware detection. In: 2018 IEEE 16th International conference on dependable, autonomic and secure computing, 16th international conference on pervasive intelligence and computing, 4th international conference on big data intelligence and computing and cyber science and technology congress(DASC/PiCom/DataCom/CyberSciTech), pp 710–715. https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00124
Misra S, A step by step guide for choosing project topics and writing research papers in ICT related disciplines, vol 1350. Springer, Cham
Mohammad A (2020) Ransomware evolution, growth and recommendation for detection. Modern Appl Sci 14:68. https://doi.org/10.5539/mas.v14n3p68
Ng C, Rajasegarar S, Pan L, Jiang F, Zhang L (2020) Voterchoice: a ransomware detection honeypot with multiple voting framework. Concurr Comput: Pract Exp 32. https://doi.org/10.1002/cpe.5726
Pastor A, Mozo A, Vakaruk S, Canavese D, López DR, Regano L, Gómez-Canaval S, Lioy A (2020) Detection of encrypted cryptomining malware connections with machine and deep learning. IEEE Access 8:158036–158055. https://doi.org/10.1109/ACCESS.2020.3019658
Pont J, Oun OA, Brierley C, Arief B, Hernandez-Castro J (2019) A roadmap for improving the impact of anti-ransomware research. In: Askarov A, Hansen R, Rafnsson W (eds) Secure IT systems, vol 11875. Springer International Publishing, Cham, pp 137–154
Poudyal S, Dasgupta D, Akhtar Z, Gupta KD (2019) A multi-level ransomware detection framework using natural language processing and machine learning
Qin B, Wang Y, Ma C (2020) API call based ransomware dynamic detection approach using textCNN. 2020 international conference on big data, artificial intelligence and internet of things engineering (ICBAIE). IEEE, Fuzhou, China, pp 162–166
Reddy BV, Krishna GJ, Ravi V, Dasgupta D (2020) Machine learning and feature selection based ransomware detection using hexacodes. In: evolution in computational intelligence, pp 583–597. Springer Singapore. https://doi.org/10.1007/978-981-15-5788-0 56
Rosli MS, Syahirah R, Yassin W, Faizal MA, Nur W (2020) Ransomware behavior attack construction via graph theory approach. Int J Adv Comput Sci Appl 11
Rouka E, Birkinshaw C, Vassilakis VG (2020) SDN-based malware detection and mitigation: the case of expetr ransomware. 2020 IEEE international conference on informatics, IoT, and enabling technologies (ICIoT). IEEE, Doha, Qatar, pp 150–155
Roy K, Chen Q (2021) Deepran: attention-based bilstm and crf for ransomware early detection and classification. Inf Syst Front 23. https://doi.org/10.1007/s10796-020-10017-4
Vinayakumar R, Jolfaei MA, Jolfaei A, Soman KP, Poornachandran P (2019) Ransomware triage using deep learning: twitter as a case study. 2019 cybersecurity and cyberforensics conference (CCC). IEEE, Melbourne, Australia, pp 67–73
Saeed S, Jhanjhi N, Naqvi M, Humayun M, Ahmed S (2020) Ransomware: a framework for security challenges in internet of things. 2020 2nd international conference on computer and information sciences (ICCIS). IEEE, Sakaka, Saudi Arabia, pp 1–6
Sahay SK, Goel N (2020) Vishwas patil. In: Jadliwala M (ed) Secure Knowledge Management. In: Artificial Intelligence Era: 8th international conference, SKM 2019. Proceedings, vol 1186. Springer, Singapore, Goa, India, pp 1–6
Saleh MA, Rass A, Evaluation of supervised machine learning classifiers for detecting ransomware based on naïve bayes, svm, knn, c 4.5, and random forest algorithms. Int J Innov Sci Res Technol 5(1):10
Scalas M, Maiorca D, Mercaldo F, Visaggio CA, Martinelli F, Giacinto G (2019) On the effectiveness of system API-related information for android ransomware detection. Comput Secur 86:168–182. https://doi.org/10.1016/j.cose.2019.06.004
Sechel: Sergiu.“a comparative assessment of obfuscated ransomware detection methods. Inform Econ 23(2):45–62. https://doi.org/10.12948/issn14531305/23.2.2019.05
Shaukat K, Luo S, Chen S, Liu D (2020) Cyber threat detection using machine learning techniques: a performance evaluation perspective. 2020 international conference on cyber warfare and security (ICCWS). IEEE, Islamabad, Pakistan, pp 1–6
Sheen S, Yadav A (2018) Ransomware detection by mining API call usage. 2018 international conference on advances in computing, communications and informatics (ICACCI). IEEE, Bangalore, pp 983–987
Song J, Meng Q, Luo C, Naik N, Xu J (2020) An immunization scheme for ransomware. Comput Mater Continua 64(2):1051–1061. https://doi.org/10.32604/cmc.2020.010592
Su D, Liu J, Wang X, Wang W (2019) Detecting android locker-ransomware on chinese social networks. IEEE Access 7:20381–20393. https://doi.org/10.1109/ACCESS.2018.2888568
Sultan NA, Thanoon KH, Ibrahim OA (2020) Ethical hacking implementation for lime worm ransomware detection. J Phys: Conf Ser 1530(012078). https://doi.org/10.1088/1742-6596/1530/1/012078
Turner AB, McCombie S, Uhlmann AJ (2020) Discerning payment patterns in bitcoin from ransomware attacks. J Money Laund Control 23(3):545–589. https://doi.org/10.1108/JMLC-02-2020-0012
Uandykova M, Lisin A, Stepanova D, Baitenova L, Mutaliyeva L (2020) Serhat yuksel, and hasan dincer. “the social and legislative principles of counteracting ransomware crime.” Entrep Sustain Issues 8(2):777–798. https://doi.org/10.9770/jesi.2020.8.2(47)
Ullah F, Javaid Q, Salam A, Ahmad M, Sarwar N (2020) Dilawar shah, and muhammad abrar. “modified decision tree technique for ransomware detection at runtime through API calls.” Sci Program 2020:1–10. https://doi.org/10.1155/2020/8845833
Usharani S, Bala P, Mary MJ (2021) Dynamic analysis on crypto-ransomware by using machine learning: gandcrab ransomware. J Phys: Conf Ser 1717(012024). https://doi.org/10.1088/1742-6596/1717/1/012024
Verma M, Kumarguru P, Deb SB, Gupta A (2018) Analysing indicator of compromises for ransomware: leveraging IOCS with machine learning techniques. 2018 IEEE international conference on intelligence and security informatics (ISI). IEEE, Miami, FL, pp 154–159
Vinayakumar R, Soman K, Velan K, Ganorkar S (2017) Evaluating shallow and deep networks for ransomware detection and classification. 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE, Udupi, pp 259–265
Wan YL, Chang JC, Chen RJ, Wang SJ (2018) Feature-selection-based ransomware detection with machine learning of data analysis. 2018 3rd international conference on computer and communication systems (ICCCS). IEEE, Nagoya, Japan, pp 85–88
Wang Z, Liu C, Qiu J, Tian Z, Cui X, Su S (2018) Automatically traceback RDP-based targeted ransomware attacks. Wirel Commun Mob Comput 2018:1–13. https://doi.org/10.1155/2018/7943586
Wani A, Revathi S (2020) Ransomware protection in IoT using software defined networking. Int J Electr Comput Eng (IJECE) 10(3). https://doi.org/10.11591/ijece.v10i3.pp3166-3175
**a T, Sun Y, Zhu S, Rasheed Z, Shafique K (2018) Toward a network-assisted approach for effective ransomware detection. In: ICST Trans Secur Safety 168506. https://doi.org/10.4108/eai.28-1-2021.168506
Zhang B, **ao W, **ao X, Sangaiah AK, Zhang W, Zhang J (2020) Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes. Fut Gener Comput Syst 110:708–720. https://doi.org/10.1016/j.future.2019.09.025
Zhang H, **ao X, Mercaldo F, Ni S, FabioMartinelli AKS (2019) Classification of ransomware families with machine learning based N-gram of opcodes. Fut. Gener. Comput. Syst. 90:211–221. ISSN 0167:739X. https://doi.org/10.1016/j.future.2018.07.052
Zuhair H, Selamat A, An empirical analysis of machine learning efficacy in anti-ransomware tools. AUE Int Res Conf/Dubai 8
Zuhair H, Selamat A, Krejcar O (2020) A multi-tier streaming analytics model of 0-day ransomware detection using machine learning. Appl Sci 10(9). https://doi.org/10.3390/app10093210
Zhou J, Hirose M, Kakizaki Y, Inomata A (2020) Evaluation to classify ransomware variants based on correlations between APIs. In: Proceedings of the 6th international conference on information systems security and privacy. vol 1, pp 465–472. https://doi.org/10.5220/0008959904650472
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Thangapandian, V. (2022). Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges. In: Misra, S., Arumugam, C. (eds) Illumination of Artificial Intelligence in Cybersecurity and Forensics. Lecture Notes on Data Engineering and Communications Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-93453-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-93453-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93452-1
Online ISBN: 978-3-030-93453-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)