Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

The increasing frequency of ransomware attacks necessitates the development of more effective detection methods. Existing image-based ransomware detection approaches have largely focused on static analysis, overlooking specialized ransomware behaviors such as encryption, privilege escalation, and system recovery disruption. Although dynamic and memory forensics-based visualization methods exist in the broader malware domain, they primarily target generic malware families and often rely on memory dumps or system snapshots without transforming behavioral features into spatially meaningful representations. Moreover, traditional machine learning methods such as Random Forest (RF), Support Vector Machine (SVM), and K-Nearest Neighbors (KNN) typically depend on manual feature engineering and large labelled datasets, limiting scalability and adaptability. To address these limitations, we propose a novel behavior-to-image ransomware detection framework that transforms dynamic behavioral features extracted from sandbox-generated JSON reports into two-dimensional (2D) grayscale and color image representations, optimized for transfer learning (TL), enabling effective classification under small-data conditions. Our approach integrates domain-specific feature filtering and impact analysis to ensure the selection of the most ransomware-relevant attributes. TL subsequently automates feature extraction and classification, eliminating the need for separate feature selection procedures and overcoming the time-consuming process of manual feature engineering. Furthermore, by leveraging prior knowledge from large-scale image datasets, TL significantly mitigates the need for extensive labelled data while maintaining high detection accuracy and strong generalization. Experimental results demonstrate that fine-tuned pretrained models, notably ResNet50, achieve up to 99.96% accuracy with a minimal loss factor of 0.0026, even with a small dataset of 500 ransomware and 500 benign samples. We further validated the model's interpretability through t-SNE visualizations and saliency maps, confirming its ability to focus on class-discriminative behavioral patterns. The low misclassification rate, along with the transparency of the model, highlights its potential for practical deployment in ransomware detection systems.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12405504PMC
http://dx.doi.org/10.1038/s41598-025-17647-1DOI Listing

Publication Analysis

Top Keywords

ransomware detection
16
transfer learning
8
behavioral features
8
manual feature
8
feature engineering
8
ransomware
7
detection
6
feature
5
novel technique
4
technique ransomware
4

Similar Publications

The increasing frequency of ransomware attacks necessitates the development of more effective detection methods. Existing image-based ransomware detection approaches have largely focused on static analysis, overlooking specialized ransomware behaviors such as encryption, privilege escalation, and system recovery disruption. Although dynamic and memory forensics-based visualization methods exist in the broader malware domain, they primarily target generic malware families and often rely on memory dumps or system snapshots without transforming behavioral features into spatially meaningful representations.

View Article and Find Full Text PDF

Privacy Protection in AI Transformation Environments: Focusing on Integrated Log System and AHP Scenario Prioritization.

Sensors (Basel)

August 2025

Interdisciplinary Program of Digital Future Convergence Service, Chonnam National University, Gwangju 61186, Republic of Korea.

Recent advancements in emerging technologies such as IoT and AI have driven digital innovation, while also accelerating the sophistication of cyberattacks and expanding the attack surface. In particular, inter-state cyber warfare, sophisticated ransomware threats, and insider-led personal data breaches have emerged as significant new security risks. In response, this study proposes a Privacy-Aware Integrated Log System model developed to mitigate diverse security threats.

View Article and Find Full Text PDF

In recent years, network attacks have occurred frequently, and Trojan horses, worms, and ransomware have emerged endlessly on the Internet. This poses a serious threat to cyber security and even national security. Therefore, a new three-branch decision soft increment K-nearest neighbor algorithm is proposed, representing the class cluster as an interval set.

View Article and Find Full Text PDF

In an era of persistent and evolving cyberthreats that pose serious risks to patient safety, institutional integrity, and regulatory compliance, healthcare organizations, particularly radiology departments, must adopt a proactive stance toward cybersecurity. Radiology departments are particularly vulnerable to cyberattacks due to their dependence on often legacy and insecure digital imaging systems, as well as a reliance on network connectivity and specialized software. This Expert Panel Narrative Review offers a strategic roadmap for healthcare institutions to prepare for and survive cybersecurity attacks, with a focus on the unique vulnerabilities within medical imaging systems that radiology departments must address.

View Article and Find Full Text PDF

The proposed cacography-based architecture tuned transformer method prevents novel ransomware email phishing (REP) attacks. Cybercriminals now create ransomware email phishing attacks through deceptive emails and text messages. Existing email phishing attacks detection based on email headers, keywords, redirect web link attempts, scanning the email body text, Uniform Resource Locator, IP address, domain name, payload analysis, unusual behaviour, network traffic, and embedded links.

View Article and Find Full Text PDF