AIセキュリティポータル K Program
Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset
Share
Abstract
Cybersecurity faces challenges in identifying and mitigating ransomware, which is important for protecting critical infrastructures. The absence of datasets for distinguishing normal versus abnormal network behaviour hinders the development of proactive detection strategies against ransomware. An obstacle in proactive prevention methods is the absence of comprehensive datasets for contrasting normal versus abnormal network behaviours. The dataset enabling such contrasts would significantly expedite threat anomaly mitigation. In this study, we introduce UGRansome2024, an optimised dataset for ransomware detection in network traffic. This dataset is derived from the UGRansome data using an intuitionistic feature engineering approach that considers only relevant patterns in network behaviour analysis. The study presents an analysis of ransomware detection using the UGRansome2024 dataset and the Random Forest algorithm. Through encoding and feature relevance determination, the Random Forest achieved a classification accuracy of 96% and effectively identified unusual ransomware transactions. Findings indicate that certain ransomware variants, such as those utilising Encrypt Decrypt Algorithms (EDA) and Globe ransomware, have the highest financial impact. These insights have significant implications for real-world cybersecurity practices, highlighting the importance of machine learning in ransomware detection and mitigation. Further research is recommended to expand datasets, explore alternative detection methods, and address limitations in current approaches.
Ugransome1819: A novel dataset for anomaly detection and zero-day threats
M. Nkongolo, J.P. Van Deventer, S.M. Kasongo
Published: 2021
A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning
M. Nkongolo, J. P. Van Deventer, S. M. Kasongo, S. R. Zahra, J. Kipongo
Published: 2022
RFSA: A Ransomware Feature Selection Algorithm for Multivariate Analysis of Malware Behavior in Cryptocurrency
M. Nkongolo Wa Nkongolo
Published: 2024
Using deep packet inspection data to examine subscribers on the network
M. Nkongolo, J.P. van Deventer, S.M. Kasongo
Published: 2022
Ransomware Detection Using Stacked Autoencoder for Feature Selection
M. Nkongolo Wa Nkongolo, M. Tokmak
Published: 2024
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction
Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami, Mohammad Ali Moni
Published: 1.22.2024
Addressing Imbalanced Data in Network Intrusion Detection: A Review and Survey
E.A. Al-Qarni, G.A. Al-Asmari
Published: 2024
A free and community-driven critical infrastructure ransomware dataset
A. Rege, R. Bleiman
Published: 2023
Theory-Guided Feature Selection in Cybercrime Data Science
S. Naidoo, R. Naidoo
Published: 2024
Dynamic feature dataset for ransomware detection using machine learning algorithms
J.A. Herrera-Silva, M. Hernández-Álvarez
Published: 2023
Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data
A. Singh, Z. Mushtaq, H.A. Abosaq, S.N.F. Mursal, M. Irfan, G. Nowakowski
Published: 2023
Selecting features by utilizing intuitionistic fuzzy Entropy method
K. Pandey, A. Mishra, P. Rani, J. Ali, R. Chakrabortty
Published: 2023
Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data
A. Singh, Z. Mushtaq, H.A. Abosaq, S.N.F. Mursal, M. Irfan, G. Nowakowski
Published: 2023
Modern netfl network dataset with labeled attacks and detection methods
M. Komisarek, M. Pawlicki, T. Simic, D. Kavcnik, R. Kozik, M. Chora S
Published: 2023
Deep analysis of risks and recent trends towards network intrusion detection system
D. Shankar, G. V. S. George, J. N. J. N. S., P. S. Madhuri
Published: 2023
A signature-based botnet (emotet) detection mechanism
F. Suthar, N. Patel, S. Khanna
Published: 2022
Deep forest approach for zero-day attacks detection
M. Tokmak
Published: 2022
Mitigating Cybersecurity Risks in the US Healthcare Sector
C.M. Okafor, A. Kolade, T. Onunka, C. Daraojimba, N.L. Eyo-Udo, O. Onunka, A. Omotosho
Published: 2023
CESSO-HCRNN: A Hybrid CRNN With Chaotic Enriched SSO-based Improved Information Gain to Detect Zero-Day Attacks
D.K. Roy, R. Patgiri
Published: 2023
Combining security and reliability of critical infrastructures: The concept of securability
L. Maglaras, H. Janicke, M.A. Ferrag
Published: 2022
Real-world applications and challenges of blockchain
V.K. Mishra
Published: 2021
Share