Enhanced Ransomware Threat Detection Based On AI-Powered Deep Feature Engineering Using Intellectual Cyber Swarm Intelligence Technique With Hyper Capsule Deep Neural Network

Authors

  • C. Porkodi
  • P. Thiyagarajan

Keywords:

Internet of Things, healthcare communication, Ransomware, cyber-attacks, Artificial Intelligence, feature engineering, malware detection, privacy, security

Abstract

Increasing the Internet of communication in heterogeneity connects the healthcare sectors to make incredible communication, monitoring, tracking, and analyzing the patients remotely through the Internet of Things. Such data are highly protective and contain sensitive and private information. Throughout, cyber-attacks are increased by attackers without knowing the user knowledge to create data breaches with the support of various malware, applications, and viruses. The fact Ransomware virus is one of the dangerous malicious activity programs tackled by attackers to create attacks to own the healthcare industries. So, privacy and security are essential to protect PHI data records from cyberattacks. Most of the traditional methodologies failed to analysis the Ransomware behavior impacts and logical progress leads poor accuracy in detection rate. Due to inadequate feature analysis, data shifting problems lead to increasing feature dimensions, producing a lower precision rate to degrade the identification rate. To resolve this problem, we propose an Artificial Intelligence powered deep feature engineering based on Intellectual Cyber Swarm Intelligence Technique (ICSIT) with Hyper Capsule Deep Neural Network (HCDNN) to identify the Ransomware properties effectively to enhance security. Initially, the preprocessing is carried out c-score normalization to verify the actual margin of feature presence in the RaNASP dataset, and the behavioural point of RaNSAP Malware Attack Impact Rate (RMDIR) is estimated by decisive margin class predictor to marginalize the affected features. Then, Linear Support Vector Swarm Intelligence Feature selection (LSV-SIFS) is applied to select the ransomware features. Finally, the Fuzzy Inference Hyper Capsule Multi Perceptron Neural Network (FIHc-MPNN) is applied to identify the behavioral class of ransomeware attack nature. The classifier marginalizes the defect feature limits to cover the mutual dependencies of attack behavior in the classifier unit to identify the attack.   The proposed system produces high performance compared to the other systems by identifying Ransomware by increasing the precession recall rate to attain a higher actual positive rate compared to other traditional methods.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Sheen, S., Asmitha, K. A., & Venkatesan, S. (2022). R-Sentry: Deception based ransomware detection using file access patterns. Computers and Electrical Engineering, 103, 108346. https://doi.org/10.1016/j.compeleceng.2022.108346

McIntosh, T.; Kayes, A.; Chen, Y.P.P.; Ng, A.; Watters, P. Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions. ACM Comput. Surv. (CSUR) 2021, 54, 1–36.

Zhang, Chongzhen, et al. "A novel framework design of network intrusion detection based on machine learning techniques." Security and Communication Networks 2021.1 (2021): 6610675.

Shankar, D., et al. "Deep analysis of risks and recent trends towards network intrusion detection system." International Journal of Advanced Computer Science and Applications 14.1 (2023).

Sladkova, Polina, et al. "Adaptive deep learning-based framework for ransomware detection through progressive feature isolation." (2024).

Alraizza, A.; Algarni, A. Ransomware Detection Using Machine Learning: A Survey. Big Data Cogn. Comput. 2023, 7, 143. https://doi.org/10.3390/bdcc7030143.

Ali, Rahman, et al. "Deep learning methods for malware and intrusion detection: A systematic literature review." Security and Communication Networks 2022.1 (2022): 2959222.

Yamany, B., Elsayed, M. S., Jurcut, A. D., Abdelbaki, N., & Azer, M. A. (2021). A New Scheme for Ransomware Classification and Clustering Using Static Features. Electronics, 11(20), 3307. https://doi.org/10.3390/electronics11203307.

Khammas, B. M. (2020). Ransomware Detection using Random Forest Technique. ICT Express, 6(4), 325-331. https://doi.org/10.1016/j.icte.2020.11.001.

Zahoora, U., Khan, A., Rajarajan, M., Khan, S. H., Asam, M., & Jamal, T. (2022). Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier. Scientific Reports, 12(1), 1-15. https://doi.org/10.1038/s41598-022-19443-7.

Hwang, J., Kim, J., Lee, S. et al. Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques. Wireless Pers Commun 112, 2597–2609 (2020). https://doi.org/10.1007/s11277-020-07166-9.

Lee, J., & Lee, K. (2022). A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms. Entropy, 24(2), 239. https://doi.org/10.3390/e24020239.

Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021). Differential area analysis for ransomware attack detection within mixed file datasets. Computers & Security, 108, 102377. https://doi.org/10.1016/j.cose.2021.102377

Brinkley, Yenisel, Daniel Thompson, and Nicholas Simmons. "Machine learning-based intrusion detection for zero-day ransomware in unseen data." (2024).

Zhang, Xueqin, Jiyuan Wang, and Shinan Zhu. "Dual generative adversarial networks based unknown encryption ransomware attack detection." IEEE Access 10 (2021): 900-913.

Y. Yang, K. Zheng, B. Wu, Y. Yang and X. Wang, "Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder with Regularization," in IEEE Access, vol. 8, pp. 42169-42184, 2020, doi: 10.1109/ACCESS.2020.2977007.

Sai Chaitanya Kumar, G., Kiran Kumar, R., Parish Venkata Kumar, K., Raghavendra Sai, N., & Brahmaiah, M. (2024). Deep residual convolutional neural Network: An efficient technique for intrusion detection system. Expert Systems with Applications, 238, 121912. https://doi.org/10.1016/j.eswa.2023.121912.

Arif, J. M., Ab Razak, M. F., Awang, S., Tuan Mat, S. R., Nadiah Ismail, N. S., & Firdaus, A. (2021). A static analysis approach for Android permission-based malware detection systems. PLOS ONE, 16(9), e0257968. https://doi.org/10.1371/journal.pone.0257968

Revathy, G., P. Sathish Kumar, and Velayutham Rajendran. "Development of IDS using mining and machine learning techniques to estimate DoS malware." International Journal of Computational Science and Engineering 24.3 (2021): 259-275.

Rajest, S S. "Application of the Catboost Classifier for the Detection of Android Ransomware," Central Asian Journal of Mathematical Theory and Computer Sciences 2024, 5(5), 476-486.

Urooj, Umara, et al. "Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks." IEEE Access (2023).

Zanoramy, Wira, et al. "Ransomware early detection using machine learning approach and pre-encryption boundary identification." Journal of Advanced Research in Applied Sciences and Engineering Technology 47.2 (2024): 121-137.

Hammood, Dalal Abdulmohsin. "A hybrid system based on machine learning and PSO for network intrusion detection." AIP Conference Proceedings. Vol. 3232. No. 1. AIP Publishing, 2024.

Sladkova, Polina, et al. "Adaptive deep learning-based framework for ransomware detection through progressive feature isolation." (2024).

Kaushik, Baijnath, et al. "Performance evaluation of learning models for intrusion detection system using feature selection." Journal of Computer Virology and Hacking Techniques 19.4 (2023): 529-548.

Downloads

Published

2025-05-22

How to Cite

1.
Porkodi C, Thiyagarajan P. Enhanced Ransomware Threat Detection Based On AI-Powered Deep Feature Engineering Using Intellectual Cyber Swarm Intelligence Technique With Hyper Capsule Deep Neural Network. J Neonatal Surg [Internet]. 2025May22 [cited 2025Sep.19];14(26S):592-610. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/6334