<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Bitlis Eren Üniversitesi Fen Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-3129</issn>
                                        <issn pub-type="epub">2147-3188</issn>
                                                                                            <publisher>
                    <publisher-name>Bitlis Eren University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17798/bitlisfen.1038966</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Ransomware Detection in Cyber Security Domain</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Ransomware Detection in Cyber Security Domain</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-0737-1966</contrib-id>
                                                                <name>
                                    <surname>Aslan</surname>
                                    <given-names>Ömer</given-names>
                                </name>
                                                                    <aff>BANDIRMA ONYEDİ EYLÜL ÜNİVERSİTESİ, BANDIRMA MESLEK YÜKSEKOKULU</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20220630">
                    <day>06</day>
                    <month>30</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>11</volume>
                                        <issue>2</issue>
                                        <fpage>508</fpage>
                                        <lpage>518</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20211220">
                        <day>12</day>
                        <month>20</month>
                        <year>2021</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20220328">
                        <day>03</day>
                        <month>28</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2012, Bitlis Eren Üniversitesi Fen Bilimleri Dergisi</copyright-statement>
                    <copyright-year>2012</copyright-year>
                    <copyright-holder>Bitlis Eren Üniversitesi Fen Bilimleri Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>In recent years, ransomware has become highly profitable cyber attacks. This is because, everyday there are several new devices attending to computer networks before testing their security strength. In addition, it is easy to launch ransomware attacks by using Ransomware-as-a-Service. This paper proposed a new method that creates the ransomware specific features by using ransomware behaviors which are performed on file, registry, and network resources. The weights are assigned to the behaviors based upon where the actions are performed. The most feasible features are selected based on the assigned weights as well as Information Gain. The selected features are classified by using ML classifiers including J48 (C4.5), RF (Random Forest), AdaBoost (Adaptive Boosting), SLR (Simple Logistic Regression), KNN (K-Nearest Neighbors), BN (Bayesian Network), and SMO (Sequential Minimal Optimization). The experiments are performed on several ransomware variants as well as benign samples. The test results show that our proposed method is feasible and effective. The DR, FPR, f-measure, and accuracy are measured as 100%, 1.4%, 99.4%, 99.38%, respectively.</p></trans-abstract>
                                                                                                                                    <abstract><p>In recent years, ransomware has become highly profitable cyber attacks. This is because, everyday there are several new devices attending to computer networks before testing their security strength. In addition, it is easy to launch ransomware attacks by using Ransomware-as-a-Service. This paper proposed a new method that creates the ransomware specific features by using ransomware behaviors which are performed on file, registry, and network resources. The weights are assigned to the behaviors based upon where the actions are performed. The most feasible features are selected based on the assigned weights as well as Information Gain. The selected features are classified by using ML classifiers including J48 (C4.5), RF (Random Forest), AdaBoost (Adaptive Boosting), SLR (Simple Logistic Regression), KNN (K-Nearest Neighbors), BN (Bayesian Network), and SMO (Sequential Minimal Optimization). The experiments are performed on several ransomware variants as well as benign samples. The test results show that our proposed method is feasible and effective. The DR, FPR, f-measure, and accuracy are measured as 100%, 1.4%, 99.4%, 99.38%, respectively.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Cyber security</kwd>
                                                    <kwd>  Ransomware detection</kwd>
                                                    <kwd>  Behavior-based detection</kwd>
                                                    <kwd>  Machine learning</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Cyber security</kwd>
                                                    <kwd>  ransomware</kwd>
                                                    <kwd>  ransomware detection</kwd>
                                                    <kwd>  behavior-based detection</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	D. Nieuwenhuizen, “A behavioural-based approach to ransomware detection,” MWR Labs Whitepaper, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Associated Press, &quot;The Latest: UN warns cybercrime on rise during pandemic,&quot; 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Sophos Report, &quot;The State of Ransomware 2021,&quot; 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Cognyte CTI Research Group, &quot;Ransomware Attack Statistics 2021 – Growth &amp; Analysis,&quot; 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	S. Morgan, &quot;Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021,&quot; Cybercrime Magazine, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Ö. Aslan and R. Samet, &quot;Investigation of possibilities to detect malware using existing Tools,&quot; in 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) (pp. 1277-1284), 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	J. P. Tailor and A.D. Patel, &quot;A comprehensive survey: ransomware attacks prevention, monitoring and damage control,&quot; Int. J. Res. Sci. Innov, vol. 15, pp. 116-121, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	R. Brewer, &quot;Ransomware attacks: detection, prevention and cure,&quot; Network Security, vol. 9, no. 5-9, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	D. Sgandurra, L. Muñoz-González, R. Mohsen and E. C. Lupu, &quot;Automated dynamic analysis of ransomware: Benefits, limitations and use for detection,&quot; arXiv preprint arXiv:1609.03020, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Ö. Aslan, R. Samet and Ö. Ö. Tanrıöver, &quot;Using a Subtractive Center Behavioral Model to Detect Malware,&quot; Security and Communication Networks, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	R. Vinayakumar, K.P. Soman, K.S. Velan and S. Ganorkar, “Evaluating shallow and deep networks for ransomware detection and classification,” in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 259-265, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	K. Cabaj, M. Gregorczyk and W. Mazurczyk, &quot;Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics,&quot; Computers and Electrical Engineering, vol. 66, pp. 353-368, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	A. O. Almashhadani, M. Kaiiali, S. Sezer and P. O’Kane, &quot;A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware,&quot; IEEE Access, vol. 7, pp. 47053-47067, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	S. I. Bae, G. B. Lee and E. G. Im, &quot;Ransomware detection using machine learning algorithms,&quot; Concurrency and Computation: Practice and Experience, vol. 32, no. 18, e5422, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Ö. Aslan and R. Samet, &quot;A comprehensive review on malware detection approaches,&quot; IEEE Access,vol. 8, pp. 6249-6271, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	C. Beaman, A. Barkworth, T. D. Akande, S. Hakak and M. K. Khan, &quot;Ransomware: Recent advances, analysis, challenges and future research directions,&quot; Computers and Security, vol. 111, pp. 102490, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Malware downloading website, https://malshare.com/, accessible in 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Malware downloading website, https://thezoo.morirt.com/, accessible in 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Malware downloading website, http://www.tekdefense.com/, accessible in 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Malware downloading website, https://virusshare.com/, accessible in 2021.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
