Volume 19 , Issue 1 , PP: 75-83, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Vyom Kulshreshtha 1 * , Deepak Motwani 2 , Pankaj Sharma 3
Doi: https://doi.org/10.54216/FPA.190107
Ransomware or crypto-ransomware is a big headache to digital media and transactions nowadays. Generally, Ransomware affects the operating system and transfers the valuable information and data stored in the system. Some ransomware attacks the system and corrupts the system file, making it useless to the user. Data encryption with a private key is also one of the attaching fashions of some types of ransomwares. Most ransomware attacks are reported in android operating system-based devices. The solution to ransomware is only the earlier identification of an attacked pattern in the operating system and removal of it. Artificial Intelligence (AI) plays a major role in various kinds of attack detection and classification processes. Machine learning (ML) technique can be used to train and classify the presence of ransomware in android-based devices. Various parameters, such as the characteristics of applications' permission access to various inputs of the devices. The data can be used to train the Recurrent Neural Network (RNN), the most popular and highly accurate ML module that performs a highly accurate classification process. The performance can be evaluated using various sensitivity evaluation metrics such as accuracy, sensitivity, specificity, and precision.
Ransomware , Crypto Ransomware , Android Operating System , Data Encryption , Artificial Intelligence , Machine Learning , Recurrent Neural Network
[1] S. Alsoghyer and I. Almomani, "On the effectiveness of application permissions for Android ransomware detection," in 2020 6th Conference on Data Science and Machine Learning Applications (CDMA), 2020, pp. 94-99. IEEE.
[2] R. Agrawal, J. W. Stokes, K. Selvaraj, and M. Marinescu, "Attention in recurrent neural networks for ransomware detection," in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019, pp. 3222-3226. IEEE.
[3] M. S. Kumar, J. Ben-Othman, and K. G. Srinivasagan, "An investigation on wannacry ransomware and its detection," in 2018 IEEE Symposium on Computers and Communications (ISCC), 2018, pp. 1-6. IEEE.
[4] M. Musonda, A. Zimba, and M. Sinyinda, "Machine learning-based crypto ransomware detection model on Windows platforms," in Proceedings of International Conference for ICT (ICICT)-Zambia, vol. 5, no. 1, 2023, pp. 141-147.
[5] O. M. K. Alhawi, J. Baldwin, and A. Dehghantanha, "Leveraging machine learning techniques for Windows ransomware network traffic detection," in Cyber Threat Intelligence, Cham, Switzerland: Springer, 2018, pp. 93-106.
[6] S. R. B. Alvee et al., "Ransomware attack modeling and artificial intelligence-based ransomware detection for digital substations," in 2021 6th IEEE Workshop on the Electronic Grid (eGRID), 2021, pp. 01-05. IEEE.
[7] R. Vinayakumar, K. P. Soman, K. K. S. Velan, and S. Ganorkar, "Evaluating shallow and deep networks for ransomware detection and classification," in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017, pp. 259-265. IEEE.
[8] J. Hwang, J. Kim, S. Lee, and K. Kim, "Two-stage ransomware detection using dynamic analysis and machine learning techniques," Wireless Personal Communications, vol. 112, no. 4, pp. 2597-2609, 2020.
[9] F. Khan, C. Ncube, L. K. Ramasamy, S. Kadry, and Y. Nam, "A digital DNA sequencing engine for ransomware detection using machine learning," IEEE Access, vol. 8, pp. 119710-119719, 2020.
[10] M. Scalas, D. Maiorca, F. Mercaldo, C. A. Visaggio, F. Martinelli, and G. Giacinto, "On the effectiveness of system API-related information for Android ransomware detection," Computers & Security, vol. 86, pp. 168-182, 2019.
[11] S. H. Kok, A. Azween, and N. Z. Jhanjhi, "Evaluation metric for crypto-ransomware detection using machine learning," Journal of Information Security and Applications, vol. 55, p. 102646, 2020.
[12] M. M. Khan, M. F. Hyder, S. M. Khan, J. Arshad, and M. M. Khan, "Ransomware prevention using moving target defense-based approach," Concurrency and Computation: Practice and Experience, vol. 35, no. 7, p. e7592, 2023.
[13] P. Yadav, N. Menon, V. Ravi, S. Vishvanathan, and T. D. Pham, "EfficientNet convolutional neural networks-based Android malware detection," Computers & Security, vol. 115, p. 102622, 2022.
[14] C. Li, K. Mills, D. Niu, R. Zhu, H. Zhang, and H. Kinawi, "Android malware detection based on factorization machine," IEEE Access, vol. 7, pp. 184008-184019, 2019.
[15] B. M. Khammas, "Ransomware detection using random forest technique," ICT Express, vol. 6, no. 4, pp. 325-331, 2020.
[16] K. A. Alissa, D. H. Elkamchouchi, K. Tarmissi, A. Yafoz, R. Alsini, O. Alghushairy, A. Mohamed, and M. A. Duhayyim, "Dwarf mongoose optimization with machine-learning-driven ransomware detection in internet of things environment," Applied Sciences, vol. 12, no. 19, p. 9513, 2022.
[17] S. R. B. Alvee, B. Ahn, T. Kim, Y. Su, Y.-W. Youn, and M.-H. Ryu, "Ransomware attack modeling and artificial intelligence-based ransomware detection for digital substations," in 2021 6th IEEE Workshop on the Electronic Grid (eGRID), 2021, pp. 01-05. IEEE.
[18] Z. Abdullah, F. W. Muhadi, M. M. Saudi, I. R. A. Hamid, and C. F. M. Foozy, "Android ransomware detection based on dynamic obtained features," in Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth International Conference on Soft Computing and Data Mining (SCDM 2020), Melaka, Malaysia, Jan. 22–23, 2020, pp. 121-129. Springer.
[19] F. Martinelli, F. Mercaldo, and A. Saracino, "Bridemaid: An hybrid tool for accurate detection of Android malware," in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017, pp. 899-901.
[20] I. Bibi, A. Akhunzada, J. Malik, G. Ahmed, and M. Raza, "An effective Android ransomware detection through multi-factor feature filtration and recurrent neural network," in 2019 UK/China Emerging Technologies (UCET), 2019, pp. 1-4. IEEE.
[21] S. Poudyal, D. Dasgupta, Z. Akhtar, and K. Gupta, "A multi-level ransomware detection framework using natural language processing and machine learning," in 14th International Conference on Malicious and Unwanted Software (MALCON), 2019.
[22] R. Almohaini, I. Almomani, and A. AlKhayer, "Hybrid-based analysis impact on ransomware detection for Android systems," Applied Sciences, vol. 11, no. 22, p. 10976, 2021.
[23] I. Baptista, S. Shiaeles, and N. Kolokotronis, "A novel malware detection system based on machine learning and binary visualization," in 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019, pp. 1-6. IEEE.
[24] T. Lu, L. Zhang, S. Wang, and Q. Gong, "Ransomware detection based on V-detector negative selection algorithm," in 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), 2017, pp. 531-536. IEEE.
[25] Q. M. Yaseen, "The effect of the ransomware dataset age on the detection accuracy of machine learning models," Information, vol. 14, no. 3, p. 193, 2023.
[26] D. Su, J. Liu, X. Wang, and W. Wang, "Detecting Android locker-ransomware on Chinese social networks," IEEE Access, vol. 7, pp. 20381-20393, 2018.