2022
DOI: 10.3390/app122412941
|View full text |Cite
|
Sign up to set email alerts
|

Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms

Abstract: Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Service (RaaS) model. RaaS enables criminals with a limited technical ability to launch ransomware attacks. Several recent high-profile cases, such as the Colonial Pipeline attack and JBS Foods, involved forcing companies to pay enormous amounts of ransom money, ind… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…Furthermore, an analysis was carried out with the RapidMiner Studio application in making an appropriate and automatic classification program. The confusion matrix, a technique for gauging the algorithm model's level of accuracy throughout the classification phase, is used for the model's evaluation and validation at this point [20], and a table that can show how well the categorization model performs [21]. The classification of prediction data derived from models based on real or accurate data is shown in Table 1.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, an analysis was carried out with the RapidMiner Studio application in making an appropriate and automatic classification program. The confusion matrix, a technique for gauging the algorithm model's level of accuracy throughout the classification phase, is used for the model's evaluation and validation at this point [20], and a table that can show how well the categorization model performs [21]. The classification of prediction data derived from models based on real or accurate data is shown in Table 1.…”
Section: Methodsmentioning
confidence: 99%
“…The method starts with entering data that was gathered during the data collecting stage, and it then moves on to text mining utilizing the naive Bayes algorithm model, support vector machine, knearest neighbors, and random forest from the outcomes of preprocessing. The performance results of the algorithm model then show that a text classification is formed into many categories.d) Validation evaluationThe confusion matrix, a technique for gauging the algorithm model's level of accuracy throughout the classification phase, is used for the model's evaluation and validation at this point[20], and a table that can show how well the categorization model performs[21].…”
mentioning
confidence: 99%
“…As the digital sphere continues to evolve, the methods employed ✹✸ by ransomware have become increasingly sophisticated, leveraging various attack vectors ✹✹ to infiltrate and compromise systems [1,14]. This relentless progression of ransomware ✹✺ attacks requires a continuous and rigorous approach to cybersecurity, particularly in the ✹✻ development of dynamic and resilient strategies to counteract these threats [1, 15,16].…”
Section: ✷✷mentioning
confidence: 99%
“…The dense and disordered nature of these ✻✵ traces often leads to a surge in computational overhead and a consequent depletion in the ✻✶ ability to accurately pinpoint and characterize malevolent activities [14,22]. This increase ✻✷ in resource consumption coupled with the challenge of accurately discerning the malicious ✻✸ from the benign has driven researchers and cybersecurity professionals to seek out more ✻✹ advanced and nuanced methods of detection and analysis [15,23,24]. As ransomware ✻✺ evolves, so too must the tools and techniques employed to detect it, underscoring the need ✻✻ for continuous innovation in the realm of cybersecurity [25,26].…”
Section: ✹✼mentioning
confidence: 99%
“…Additionally, [11] suggests monitoring external server connections to identify ransomware activities early on, thereby preventing the completion of the encryption processes. Bold et al [12] stress the importance of intelligent early detection in reducing false negatives, emphasizing the advantages of promptly identifying and eradicating ransomware. Thus, early detection of ransomware through advanced detection techniques is essential to prevent data loss, financial harm, and operational disruptions resulting from ransomware attacks.…”
Section: Introductionmentioning
confidence: 99%