The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Enhancing Crypto Ransomware Detection Through Network Analysis and Machine Learning
|
Author(s): S. Metilda Florence (SRM Institute of Science and Technology, India), Akshay Raghava (SRM Institute of Science and Technology, India), M. J. Yadhu Krishna (SRM Institute of Science and Technology, India), Shreya Sinha (SRM Institute of Science and Technology, India), Kavya Pasagada (SRM Institute of Science and Technology, India)and Tanuja Kharol (SRM Institute of Science and Technology, India)
Copyright: 2024
Pages: 19
Source title:
Innovative Machine Learning Applications for Cryptography
Source Author(s)/Editor(s): J. Anitha Ruth (SRM Institute of Science and Technology, Vadapalani, India), G.V. Mahesh Vijayalakshmi (BMS Institute of Technology and Management, India), P. Visalakshi (Department of Networking and Communications, College of Engineering and Technology, SRM Institute of Science and Technology, Katankulathur, India), R. Uma (Sri Sairam Engineering College, Chennai, India)and A. Meenakshi (SRM Institute of Science and Technology, Vadapalani, India)
DOI: 10.4018/979-8-3693-1642-9.ch012
Purchase
|
Abstract
Crypto ransomware presents an ever-growing menace as it encrypts victim data and demands a ransom for decryption. The increasing frequency of ransomware attacks underscores the need for advanced detection techniques. A machine learning classification model is proposed to identify ransomware families. These models utilize specific network traffic features, with a particular emphasis on analyzing the user datagram protocol (UDP) and internet control message protocol (ICMP). Importantly, this approach incorporates feature selection to enhance efficiency without compromising accuracy, resulting in reduced memory usage and faster processing times. The proposed experiment utilizes various machine learning algorithms, including decision trees and random forest, to create highly accurate models for classifying ransomware families. Furthermore, the experiment combined network traffic analysis with other sophisticated methods such as behavioral analysis and honeypot deployment to effectively scale crypto ransomware detection.
Related Content
Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda.
© 2024.
26 pages.
|
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha.
© 2024.
20 pages.
|
K. Sriprasadh.
© 2024.
24 pages.
|
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh.
© 2024.
20 pages.
|
R. Jayashree, J. Venkata Subramanian.
© 2024.
14 pages.
|
M. Indira, K. S. Mohanasundaram, M. Saranya.
© 2024.
14 pages.
|
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith.
© 2024.
26 pages.
|
|
|