DETECTION OF RANSOMWARE ATTACKS USING PROCESSOR AND DISK USAGE DATA
Authors:
Mr. K. Gnaneshwer, Swetha T, G Ananya Rao, Buddha Anjali, B Sohith
Page No: 140-148
Abstract:
Ransomware can successfully evade traditional antivirus programs, encrypt user data, and render both the system and its contents inaccessible. Common detection strategies involve observing process behavior, file operations, and system calls on the infected system, followed by analyzing the gathered data. However, monitoring several processes can be resource-intensive, and advanced ransomware may interfere with this process, leading to corrupted information. This study introduces a dependable and also efficient method in order to identify ransomware running inside a virtual machine (VM). Instead of inspecting individual processes within the VM, data on specific processor and disk I/O activities is gathered from the host system. A machine learning (ML) classifier is used to introduce a detection model. This solution eliminates the problem of process-level monitoring and avoids threat of ransomware altering the collected input.
Description:
.
Volume & Issue
Volume-14,ISSUE-5
Keywords
Machine Learning, Ransomware, Virtual Machines, Convultional Neural Networks, Hardware performance counters, Voting classifier, SVM, KNN