Effective Ransomware Attacks Detection Using CNN Algorithm
Abstract
This study identified ransomware threats in social media platforms by evaluating the performance of Assessing different machine-learning algorithms in various aspects of detecting and classifying ransomware content. The primary problem revolves around the need to enhance cybersecurity within the dynamic landscape of social media, where users are increasingly susceptible to malicious attacks. The research objectives involve assessing the effectiveness of different algorithms, including Convolutional Neural Networks (CNN), Support Vector Machines (SVM), Decision Trees, K-Nearest Neighbors (KNN), Gaussian Naive Bayes (GNB), and Gradient Boosting (GBoost), in distinguishing between ransomware and benign content. A dataset consisting of 6,245 records with 15 features is employed to achieve this. The methods encompass data preprocessing, algorithm implementation, and performance evaluation using accuracy, precision, recall, and F1-score metrics. The research results revealed significant variations in algorithm performance, with Decision Tree and GBoost exhibiting exceptional accuracy while class imbalance challenges and model optimization issues were identified. These findings provide valuable insights into the complex realm of ransomware detection in social media, offering a foundation for future research and cybersecurity improvements in the digital space.
Downloads
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
IJICOM is an open-access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.