but using a single classifying algorithm to detect new
variants of the ransomware is bound to fail.
Prior attention was given to binary sequence
classification of API calls using LSTMs, as described
in (Khammas, Ban Mohammed et al., 2020). This work
focused on behavior recognition rudiment detection
but faced challenging cost and training time
problems. These shortcomings highlight the need for
a cost-effective, efficient, and scalable accurate
ransomware detection system.
In order to mitigate these shortcomings, this work
introduces a new Ransomware Attack Detection Tool
that combines optimal machine learning techniques
for real-time ransomware detection. This solution
uses feature importance analysis, XG Boost, and
Flask to produce better results than previous studies.
The goal of the developed system is to improve the
detection accuracy and to reduce the false accuracy
rates and to respond to new ransomware variants
more readily than other existing systems.
2 RELATED WORKS
Modern technological advancements come with their
own set of challenges, one of the most critical being
the rise of ransomware. Numerous papers focused on
the surveillance of ransomware with Machine
Learning (ML) and Deep Learning (DL), offering
different approaches to behavior analysis, feature
selection, and API call tracking. Nevertheless, the
previously stated techniques still have issues with
new variants of ransomware, inefficient detection
periods, and high false-positive rates. This research
proposes a solution through the design of an
optimized ML model with real time detection features
to fill these gaps.
2.1 Review on Existing Literature
Several studies have investigated various methods for
ransomware detection. Wan et al. (Y. -L. Wan et al.,
2018) focuses on feature selection for the application
of traditional ML models in ransomware detection.
However, he does not apply boosting methods and his
solution does not accomplish real-time detection.
Other study (S. Poudyalet al., 2018) works with static
and behavioral features for a designed framework of
ransomware synthesis using a number of ML
classifiers, but does not explain model deployment
for real-time detection. In (Alsaidi et al., 2022), a
comparison of AI techniques in the aspects of ML and
DL for ransomware detection is given which
demonstrates some benefits of deep learning models,
particularly with LSTMs, but the models have
extremely high computational costs which makes
real-time live implementations very difficult. The
research in (Maniath, S et al., 2017) uses the Random
Forest algorithm for classification and also states that
feature contrivance is very essential in the detection
of the features of the ransomware, but the problem
with using only one classifier is that it leads to biases
and poor generalization performance of unseen
variants. Another approach (Khammas, Ban
Mohammed., 2020) uses API calls for monitoring and
was able to produce some results, but it is very LSTM
heavy which makes it expensive and very slow.
2.2 Research Gaps Identified in
Existing Studies
Lack of Real-Time Monitoring: Most studies prefer
batch mode over real-time threat monitoring.
Costly Processing of Deep Learning Frameworks:
Some literature suggests the use of deep learning
methods which are highly resourceful making real
time detection unreasonable.
Poor Feature Selection and Model Optimizing:
Not a few studies do not carry out sophisticated
feature engineering and model boosting.
Very High Rate of Incorrect Alarms: The
application of machine learning is not capable of
correctly distinguishing benign processes from the
processes which are infected with ransomware so the
possibilities of false alarms increase.
Issues with Diversifying: Several methods ignore the
possibility of accommodating newly introduced
variants of ransomware.
2.3 Addressing the Research Gaps in
this Project
This research builds on work done previously by
integrating machine learning approaches into the real
time detection of ransomware attacks. The gaps found
in the prior research have been addressed in our
Ransomware Attack Detection Tool by increasing
accuracy, reducing the number of false positives, and
improving scope of the tool. Further refinements will
center on deployment in cloud environments and
integration with deep learning for increased defense
against ransomware attacks. Table 1 shows the
Research Gaps vs Our Solution.