SlideShare a Scribd company logo
1 of 15
PREDICT ANDROID
RANSOMWARE ATTACK
USING CATEGORICAL
CLASSIFICATION
MENTOR: Dr. N. Ramshankar B. Tech, M.E., Phd
TEAM MEMBERS:
Likhitha L(111520104083)
Mrudhula K (111520104067)
Lahari Sai P(111520104082)
ABSTRACT
Android ransomware has become a
significant cybersecurity threat, posing
serious risks to mobile devices and users'
data. This research presents an approach
for predicting Android ransomware attacks
using categorical classification techniques.
The research findings demonstrate the
efficacy of the proposed approach in
predicting Android ransomware attacks
with high accuracy.
LITERATURE SURVEY
3/28/2024
Author Title Methodology
Manuela Horduna1 , Simona-Maria
and Emil Simion2
A note on machine learning applied in
ransomware detection
Year: 2022
Briefly present the most important
events in terms of ransomware attacks,
providing details about the ransoms
demanded.
Mazen Gazzan 1,2 and Frederick T.
Sheldon 1
Opportunities for Early Detection and
Prediction of Ransomware Attacks
against Industrial Control Systems. Year:
2022
Discuss the need for a multi-disciplinary
approach that involves a close
collaboration between the cybersecurity
and ICS communities
Qingyuan Gong, Yushan Liu, Jiayun
Zhang, Yang Chen
Detecting Malicious Accounts in Online
Developer Communities Using Deep
Learning. Year : 2021
Proposed GitSec, a deep learning-based
solution for detecting malicious
accounts in online developer
communities.
Kateryna Chumachenko Machine Learning Methods for Malware
Detections and Classification. Year: 2017
Determine the best feature extraction,
feature representation, and
classification methods that result in the
best accuracy when used
Shubham Shakya1 and Mayank
Dave2
Analysis, Detection, and Classification of
Android Malware using System Calls.
Year: 2020
Detecting android malware using
System calls.
EXISTING SYSTEM
• The authors introduce MSDROID, an innovative Android malware detection system that addresses two
critical challenges faced in the field: robustness in real-world scenarios and the need for interpretable
explanations. The system takes inspiration from common practices of security analysts by filtering APIs and
focusing on local snippets surrounding sensitive APIs, rather than analyzing the entire program.
• Each snippet is represented as a graph, incorporating both code attributes and domain knowledge, which is
then classified using a Graph Neural Network (GNN). This local perspective allows the GNN classifier to
concentrate on code segments highly correlated with malicious behaviors, enhancing the system's
robustness. Moreover, the information contained in the graphs contributes to a better understanding of
the behaviors, making MSDROID more interpretable in nature.
• The efficacy of MSDROID is extensively evaluated through a comprehensive comparison with five baseline
methods on a dataset of more than 81K apps in various real-world scenarios, including zero-day, evolution,
and obfuscation. The experimental results demonstrate that MSDROID excels in robustness, outperforming
state of-the-art systems in all cases, with a notable advantage of 5.37% to 49.52% in F1-score. Additionally,
the article showcases that the provided explanations are effective in facilitating malware analysis, enabling
experts to gain valuable insights into the detection decisions and behavior correlations.
• MSDROID represents a significant advancement in Android malware detection, offering improved robustness
and interpretability, which are crucial for addressing the ever-evolving landscape of cybersecurity threats in
the mobile ecosystem.
4
PROPOSED SYSTEM
• The proposed system aims to predict Android ransomware attacks using categorical classification techniques.
To achieve this, a diverse dataset of Android applications, encompassing both benign and ransomware
samples, is collected. Relevant features, including permissions, API calls, and other attributes, are extracted
from each app.
• Categorical classification algorithms, such as Bernoulli naive bayes, Random forest Algorithm, Xgboost
Algorithm, are employed to train the model to predict whether an application is benign or contains
ransomware. The performance of the model is thoroughly evaluated using accuracy, precision, recall, F1-
score, and confusion matrix metrics.
• Once the model demonstrates satisfactory performance, it is integrated into an Android application or
system, enabling real-time scanning and prediction of ransomware attacks. Throughout the development
process, utmost attention is given to ethical practices and security considerations to handle potential risks
associated with malware detection projects.
• Ultimately, the proposed system contributes to enhancing mobile security by providing an effective means of
detecting and preventing Android ransomware attacks.
5
SOFTWARE REQUIREMENTS:
• Operating System : Windows
• Tool: Anaconda with Jupyter Notebook
• Processor: Intel
PROGRAMMING LANGUAGES
AND LIBRARIES:
• Python
• django
• Sklearn and NumPy
• Pandas and Matplotlib
• PyCharm, VSCode
FLOW DIAGRAM
7
List Of Modules:
8
1. Data Collection Module
2. Data Preprocessing Module
3. Data Analysis Module
4. Data Classification Module
5. Model Evaluation Module
6. User Interaction Module
List Of Modules:
9
1. Data Collection Module
2. Data Preprocessing Module
3. Data Analysis Module
4. Data Classification Module
5. Model Evaluation Module
6. User Interaction Module
Module Explanation
10
Data Collection Module​:
Collected malware related text dataset .This Dataset contains 10000 records.
It is classified into 2 classes.
1. Malware
2. Benign
Data Preprocessing Module:
This module involves importing the dataset, processing it using libraries like Pandas and
NumPy, and performing data cleaning tasks such as handling missing values, removing
duplicates, and transforming the data into a suitable format for analysis.
Data Analysis Module:
In this phase, exploratory data analysis techniques are employed to understand the
characteristics of the dataset. This includes examining summary statistics, data distributions,
correlations between variables.
Visualization: Visualizations are created to represent the data in a graphical form, making it
easier to interpret and derive insights. Graphs such as Pie Charts and Bar Graphs are used to
visualize categorical data and distributions, while other types of plots like scatter plots or heatmaps
may be used for exploring relationships between variables.
Data Classification Module:
This module focuses on classifying the data into benign and malware categories. Various
classification algorithms like Naive Bayes (BNB)algorithm, XG Boost algorithm, and Random
Forest algorithm are implemented and trained on the dataset.
11
Model Evaluation Module:
After training the classification models, this module evaluates their performance using
evaluation metrics such as precision, recall, F1 score, and support values. The dataset is split into
training and testing sets (80% for training, 20% for testing) to assess the models' accuracy and
generalization ability.
User Interaction Module
An interface is developed to allow users to interact with the trained models. Users can input
data related to an Android system and receive predictions on whether it is likely to have malware.
The interface provides a user-friendly experience for accessing the predictive functionality of the
models.
12
Output and Demo
13
THANK YOU

More Related Content

Similar to Predict Android ransomware using categorical classifiaction.pptx

Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningIRJET Journal
 
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...IJCNCJournal
 
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...IJCNCJournal
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTtsysglobalsolutions
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDIRJET Journal
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET Journal
 
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...IJCNCJournal
 
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...IJCNCJournal
 
Android malware detection through online learning
Android malware detection through online learningAndroid malware detection through online learning
Android malware detection through online learningIJARIIT
 
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...IRJET Journal
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Zahid Qaisar
 
Permission based Android Malware Detection using Random Forest
Permission based Android Malware Detection using Random ForestPermission based Android Malware Detection using Random Forest
Permission based Android Malware Detection using Random ForestIRJET Journal
 
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...ijitjournal
 
Improve malware classifiers performance using cost-sensitive learning for imb...
Improve malware classifiers performance using cost-sensitive learning for imb...Improve malware classifiers performance using cost-sensitive learning for imb...
Improve malware classifiers performance using cost-sensitive learning for imb...IAESIJAI
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET Journal
 

Similar to Predict Android ransomware using categorical classifiaction.pptx (20)

Droid echo
Droid echoDroid echo
Droid echo
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
 
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...
 
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
Android malware detection through online learning
Android malware detection through online learningAndroid malware detection through online learning
Android malware detection through online learning
 
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)
 
Permission based Android Malware Detection using Random Forest
Permission based Android Malware Detection using Random ForestPermission based Android Malware Detection using Random Forest
Permission based Android Malware Detection using Random Forest
 
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
 
Improve malware classifiers performance using cost-sensitive learning for imb...
Improve malware classifiers performance using cost-sensitive learning for imb...Improve malware classifiers performance using cost-sensitive learning for imb...
Improve malware classifiers performance using cost-sensitive learning for imb...
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 

Recently uploaded

哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (8)

哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 

Predict Android ransomware using categorical classifiaction.pptx

  • 1. PREDICT ANDROID RANSOMWARE ATTACK USING CATEGORICAL CLASSIFICATION MENTOR: Dr. N. Ramshankar B. Tech, M.E., Phd TEAM MEMBERS: Likhitha L(111520104083) Mrudhula K (111520104067) Lahari Sai P(111520104082)
  • 2. ABSTRACT Android ransomware has become a significant cybersecurity threat, posing serious risks to mobile devices and users' data. This research presents an approach for predicting Android ransomware attacks using categorical classification techniques. The research findings demonstrate the efficacy of the proposed approach in predicting Android ransomware attacks with high accuracy.
  • 3. LITERATURE SURVEY 3/28/2024 Author Title Methodology Manuela Horduna1 , Simona-Maria and Emil Simion2 A note on machine learning applied in ransomware detection Year: 2022 Briefly present the most important events in terms of ransomware attacks, providing details about the ransoms demanded. Mazen Gazzan 1,2 and Frederick T. Sheldon 1 Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems. Year: 2022 Discuss the need for a multi-disciplinary approach that involves a close collaboration between the cybersecurity and ICS communities Qingyuan Gong, Yushan Liu, Jiayun Zhang, Yang Chen Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. Year : 2021 Proposed GitSec, a deep learning-based solution for detecting malicious accounts in online developer communities. Kateryna Chumachenko Machine Learning Methods for Malware Detections and Classification. Year: 2017 Determine the best feature extraction, feature representation, and classification methods that result in the best accuracy when used Shubham Shakya1 and Mayank Dave2 Analysis, Detection, and Classification of Android Malware using System Calls. Year: 2020 Detecting android malware using System calls.
  • 4. EXISTING SYSTEM • The authors introduce MSDROID, an innovative Android malware detection system that addresses two critical challenges faced in the field: robustness in real-world scenarios and the need for interpretable explanations. The system takes inspiration from common practices of security analysts by filtering APIs and focusing on local snippets surrounding sensitive APIs, rather than analyzing the entire program. • Each snippet is represented as a graph, incorporating both code attributes and domain knowledge, which is then classified using a Graph Neural Network (GNN). This local perspective allows the GNN classifier to concentrate on code segments highly correlated with malicious behaviors, enhancing the system's robustness. Moreover, the information contained in the graphs contributes to a better understanding of the behaviors, making MSDROID more interpretable in nature. • The efficacy of MSDROID is extensively evaluated through a comprehensive comparison with five baseline methods on a dataset of more than 81K apps in various real-world scenarios, including zero-day, evolution, and obfuscation. The experimental results demonstrate that MSDROID excels in robustness, outperforming state of-the-art systems in all cases, with a notable advantage of 5.37% to 49.52% in F1-score. Additionally, the article showcases that the provided explanations are effective in facilitating malware analysis, enabling experts to gain valuable insights into the detection decisions and behavior correlations. • MSDROID represents a significant advancement in Android malware detection, offering improved robustness and interpretability, which are crucial for addressing the ever-evolving landscape of cybersecurity threats in the mobile ecosystem. 4
  • 5. PROPOSED SYSTEM • The proposed system aims to predict Android ransomware attacks using categorical classification techniques. To achieve this, a diverse dataset of Android applications, encompassing both benign and ransomware samples, is collected. Relevant features, including permissions, API calls, and other attributes, are extracted from each app. • Categorical classification algorithms, such as Bernoulli naive bayes, Random forest Algorithm, Xgboost Algorithm, are employed to train the model to predict whether an application is benign or contains ransomware. The performance of the model is thoroughly evaluated using accuracy, precision, recall, F1- score, and confusion matrix metrics. • Once the model demonstrates satisfactory performance, it is integrated into an Android application or system, enabling real-time scanning and prediction of ransomware attacks. Throughout the development process, utmost attention is given to ethical practices and security considerations to handle potential risks associated with malware detection projects. • Ultimately, the proposed system contributes to enhancing mobile security by providing an effective means of detecting and preventing Android ransomware attacks. 5
  • 6. SOFTWARE REQUIREMENTS: • Operating System : Windows • Tool: Anaconda with Jupyter Notebook • Processor: Intel PROGRAMMING LANGUAGES AND LIBRARIES: • Python • django • Sklearn and NumPy • Pandas and Matplotlib • PyCharm, VSCode
  • 8. List Of Modules: 8 1. Data Collection Module 2. Data Preprocessing Module 3. Data Analysis Module 4. Data Classification Module 5. Model Evaluation Module 6. User Interaction Module
  • 9. List Of Modules: 9 1. Data Collection Module 2. Data Preprocessing Module 3. Data Analysis Module 4. Data Classification Module 5. Model Evaluation Module 6. User Interaction Module
  • 10. Module Explanation 10 Data Collection Module​: Collected malware related text dataset .This Dataset contains 10000 records. It is classified into 2 classes. 1. Malware 2. Benign Data Preprocessing Module: This module involves importing the dataset, processing it using libraries like Pandas and NumPy, and performing data cleaning tasks such as handling missing values, removing duplicates, and transforming the data into a suitable format for analysis.
  • 11. Data Analysis Module: In this phase, exploratory data analysis techniques are employed to understand the characteristics of the dataset. This includes examining summary statistics, data distributions, correlations between variables. Visualization: Visualizations are created to represent the data in a graphical form, making it easier to interpret and derive insights. Graphs such as Pie Charts and Bar Graphs are used to visualize categorical data and distributions, while other types of plots like scatter plots or heatmaps may be used for exploring relationships between variables. Data Classification Module: This module focuses on classifying the data into benign and malware categories. Various classification algorithms like Naive Bayes (BNB)algorithm, XG Boost algorithm, and Random Forest algorithm are implemented and trained on the dataset. 11
  • 12. Model Evaluation Module: After training the classification models, this module evaluates their performance using evaluation metrics such as precision, recall, F1 score, and support values. The dataset is split into training and testing sets (80% for training, 20% for testing) to assess the models' accuracy and generalization ability. User Interaction Module An interface is developed to allow users to interact with the trained models. Users can input data related to an Android system and receive predictions on whether it is likely to have malware. The interface provides a user-friendly experience for accessing the predictive functionality of the models. 12
  • 14.