Publication: Ransomware Early Detection Techniques
| dc.contributor.author | Alhashmi, Asma A. | |
| dc.contributor.author | Darem, Abdul Basit | |
| dc.contributor.author | Alshammari, Ahmad Badi | |
| dc.contributor.author | Darem, Laith A. | |
| dc.contributor.author | Sheatah, Huda K. | |
| dc.contributor.author | Effghi, Rachid | |
| dc.contributor.institution | Alhashmi, Asma A., Department of Computer Science, Northern Border University, Arar, Saudi Arabia | |
| dc.contributor.institution | Darem, Abdul Basit, Department of Computer Science, Northern Border University, Arar, Saudi Arabia | |
| dc.contributor.institution | Alshammari, Ahmad Badi, Department of Computer Science, Northern Border University, Arar, Saudi Arabia | |
| dc.contributor.institution | Darem, Laith A., Department of Electrical Engineering, Northern Border University, Arar, Saudi Arabia | |
| dc.contributor.institution | Sheatah, Huda K., Department of Computer Science, Northern Border University, Arar, Saudi Arabia | |
| dc.contributor.institution | Effghi, Rachid, Department of Big Data Analytics and Management, Bahçeşehir Üniversitesi, Istanbul, Turkey | |
| dc.date.accessioned | 2025-10-05T14:46:56Z | |
| dc.date.issued | 2024 | |
| dc.description.abstract | Ransomware has become a significant threat to individuals and organizations worldwide, causing substantial financial losses and disruptions. Early detection of ransomware is crucial to mitigate its impact. The significance of early detection lies in the capture of ransomware in the act of encrypting sample files, thus thwarting its progression. A timely response to ransomware is crucial to prevent the encryption of additional files, a scenario not adequately addressed by current antivirus programs. This study evaluates the performance of six machine-learning algorithms for ransomware detection, comparing the accuracy, precision, recall, and F1-score of Logistic Regression, Decision Tree, Naive Bayes, Random Forest, AdaBoost, and XGBoost. Additionally, their computational performance is evaluated, including build time, training time, classification speed, computational time, and Kappa statistic. This analysis provides an insight into the practical feasibility of the algorithms for real-world deployment. The findings suggest that Random Forst, Decision Tree, and XGBoost are promising algorithms for ransomware detection due to their high accuracy of 99.37%, 99.42%, and 99.48%, respectively. These algorithms are also relatively efficient in terms of classification speed, which makes them suitable for real-time detection scenarios, as they can effectively identify ransomware samples even in the presence of noise and data variations. © 2024 Elsevier B.V., All rights reserved. | |
| dc.identifier.doi | 10.48084/etasr.6915 | |
| dc.identifier.endpage | 14503 | |
| dc.identifier.issn | 22414487 | |
| dc.identifier.issn | 17928036 | |
| dc.identifier.issue | 3 | |
| dc.identifier.scopus | 2-s2.0-85196113980 | |
| dc.identifier.startpage | 14497 | |
| dc.identifier.uri | https://doi.org/10.48084/etasr.6915 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14719/7150 | |
| dc.identifier.volume | 14 | |
| dc.language.iso | en | |
| dc.publisher | Dr D. Pylarinos | |
| dc.relation.oastatus | All Open Access | |
| dc.relation.oastatus | Gold Open Access | |
| dc.relation.source | Engineering, Technology and Applied Science Research | |
| dc.subject.authorkeywords | Computational Performance | |
| dc.subject.authorkeywords | Cybersecurity | |
| dc.subject.authorkeywords | Early Detection | |
| dc.subject.authorkeywords | Machine Learning | |
| dc.subject.authorkeywords | Ransomware | |
| dc.title | Ransomware Early Detection Techniques | |
| dc.type | Article | |
| dcterms.references | Dang, Dennis, Malware classification using long short-term memory models, pp. 743-752, (2021), Journal of Information Security and Cybercrimes Research, (2021), Playing with Lives Cyberattacks on Healthcare are Attacks on People, (2021), Hummer, Don, Handbook on Crime and Technology, pp. 1-462, (2023), Rigaki, Maria, Bringing a GAN to a knife-fight: Adapting malware communication to avoid detection, pp. 70-75, (2018), Security Info Watch, (2020), Security Intelligence, Shaukat, Kamran, A Survey on Machine Learning Techniques for Cyber Security in the Last Decade, IEEE Access, 8, pp. 222310-222354, (2020), Hwang, Jinsoo, Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques, Wireless Personal Communications, 112, 4, pp. 2597-2609, (2020), Alhashmi, Asma A., An Ensemble-based Fraud Detection Model for Financial Transaction Cyber Threat Classification and Countermeasures, Engineering, Technology and Applied Science Research, 13, 6, pp. 12433-12439, (2023) | |
| dspace.entity.type | Publication | |
| local.indexed.at | Scopus | |
| person.identifier.scopus-author-id | 57222024708 | |
| person.identifier.scopus-author-id | 57195220438 | |
| person.identifier.scopus-author-id | 59198774600 | |
| person.identifier.scopus-author-id | 59173567500 | |
| person.identifier.scopus-author-id | 59174457100 | |
| person.identifier.scopus-author-id | 58768486900 |
