Majority Voting Approach to Ransomware Detection

05/30/2023
by   Simon R. Davies, et al.
0

Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on either the executable code, the process under investigation, its behaviour, or its output. In a small subset of ransomware detection systems, the concept of a scorecard is employed where multiple tests are performed on various aspects of a process under investigation and their results are then analysed using machine learning. The purpose of this paper is to propose a new majority voting approach to ransomware detection by developing a method that uses a cumulative score derived from discrete tests based on calculations using algorithmic rather than heuristic techniques. The paper describes 23 candidate tests, as well as 9 Windows API tests which are validated to determine both their accuracy and viability for use within a ransomware detection system. Using a cumulative score calculation approach to ransomware detection has several benefits, such as the immunity to the occasional inaccuracy of individual tests when making its final classification. The system can also leverage multiple tests that can be both comprehensive and complimentary in an attempt to achieve a broader, deeper, and more robust analysis of the program under investigation. Additionally, the use of multiple collaborative tests also significantly hinders ransomware from masking or modifying its behaviour in an attempt to bypass detection.

READ FULL TEXT

page 9

page 11

research
09/30/2017

Unsupervised Classification of Intrusive Igneous Rock Thin Section Images using Edge Detection and Colour Analysis

Classification of rocks is one of the fundamental tasks in a geological ...
research
11/05/2017

Provenance and Pseudo-Provenance for Seeded Learning-Based Automated Test Generation

Many methods for automated software test generation, including some that...
research
03/17/2021

Code Word Detection in Fraud Investigations using a Deep-Learning Approach

In modern litigation, fraud investigators often face an overwhelming num...
research
01/30/2022

Optimising the reliability that can be claimed for a software-based system based on failure-free tests of its components

This short paper describes a numerical method for optimising the conserv...
research
10/13/2012

Inference of Fine-grained Attributes of Bengali Corpus for Stylometry Detection

Stylometry, the science of inferring characteristics of the author from ...
research
07/27/2018

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection

Ransomware has become a significant global threat with the ransomware-as...
research
09/03/2022

Phishing URL Detection: A Network-based Approach Robust to Evasion

Many cyberattacks start with disseminating phishing URLs. When clicking ...

Please sign up or login with your details

Forgot password? Click here to reset