These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
In the rapidly evolving landscape of cybersecurity threats, ransomware
represents a significant challenge. Attackers increasingly employ sophisticated
encryption methods, such as entropy reduction through Base64 encoding, and
partial or intermittent encryption to evade traditional detection methods. This
study explores the dynamic battle between adversaries who continuously refine
encryption strategies and defenders developing advanced countermeasures to
protect vulnerable data. We investigate the application of online incremental
machine learning algorithms designed to predict file encryption activities
despite adversaries evolving obfuscation techniques. Our analysis utilizes an
extensive dataset of 32.6 GB, comprising 11,928 files across multiple formats,
including Microsoft Word documents (doc), PowerPoint presentations (ppt), Excel
spreadsheets (xlsx), image formats (jpg, jpeg, png, tif, gif), PDFs (pdf),
audio (mp3), and video (mp4) files. These files were encrypted by 75 distinct
ransomware families, facilitating a robust empirical evaluation of machine
learning classifiers effectiveness against diverse encryption tactics. Results
highlight the Hoeffding Tree algorithms superior incremental learning
capability, particularly effective in detecting traditional and AES-Base64
encryption methods employed to lower entropy. Conversely, the Random Forest
classifier with warm-start functionality excels at identifying intermittent
encryption methods, demonstrating the necessity of tailored machine learning
solutions to counter sophisticated ransomware strategies.
External Datasets
3,200 files (8.13 GB) across multiple formats, including JPG, PDF, Microsoft documents, and TIFF
approximately 32.6 GB, encompassing a total of 11,928 files
1,500 distinct ransomware samples sourced from various public repositories
a dataset that featured 11,928 files, totaling 32.6GB in size, encrypted through various techniques from 75 unique ransomware families