https://journal.50sea.com/index.php/IJIST/article/view/645/1249
Journal Title: International Journal of Innovations in Science and Technology - Year 2024, Vol 6, Issue 1
Abstract
Ransomware has emerged as a prominent cyber threat in recent years, targeting numerous businesses. In response to the escalating frequency of attacks, organizations are increasingly seeking effective tools and strategies to mitigate the impact of ransomware incidents. This research addresses the pressing need for real-time detection of ransomware, offering a solution that leverages cutting-edge technologies. The surge in ransomware attacks poses a significant challenge to the cybersecurity landscape, compelling organizations to adopt proactive measures. Recognizing the urgency of the situation, this study motivates the exploration of an innovative approach to ransomware detection. By utilizing advanced tools such as Apache Kafka and Spark, we aim to enhance detection capabilities and contribute to the resilience of businesses against cyber threats. Our methodology employs the Kafka tool and Spark for real-time identification of ransomware exploits. The research utilizes the CICMalMem-2022 dataset to develop and validate the proposed model. The integration of Apache Kafka with traditional machine learning techniques is explored to improve the accuracy of cyber threat detection, offering a comprehensive and efficient solution. The implemented model exhibits a commendable detection rate of 95.2%, demonstrating its effectiveness in identifying ransomware attacks in real-time. The combination of Apache Kafka's streaming capabilities and established machine learning methodologies proves to be a potent defense against the evolving landscape of cyber threats. In conclusion, our research provides a robust and practical approach to combating ransomware threats through real-time detection. By leveraging the synergy of Kafka and machine learning, organizations can fortify their cybersecurity defenses and respond proactively to potential ransomware exploits. This study contributes valuable insights and tools to the ongoing efforts in enhancing cyber resilience.
Authors and Affiliations
Saad Khan, Rana Marwat Hussain, Talha Saleem Baig, Mian Muhammad Qasim
AI-Driven Weed Classification for Improved Cotton Farming in Sindh, Pakistan
This research study proclaims the combination of artificial intelligence and also IoT in precision agriculture, highlighting weed discovery plus cotton plant monitoring in Sindh, Pakistan. The uniqueness lies in creati...
Explicit State Model Checking Effects on Learning-Based Testing
Exploring the impact of integrating an explicit state model checker into the learningbased testing (LBT) framework presents an intriguing challenge. Traditionally, LBT has leveraged symbolic model checkers such as NuSMV...
Algorithmic Implementation and Evaluation for Image Segmentation Techniques
This research conducts a comprehensive comparative analysis of five prominent image segmentation algorithms, including Thresholding, K-Means Clustering, Mean Shift, Graph-Based Segmentation (Watershed), and U-Net (Deep...
Using Spatial Covariance of Geometric and Shape Based Features for Recognition of Basic and Compound Emotions
Introduction / Importance of Study: Compound emotion recognition has been an emerging area of research for the last decade due to its vast applications in surveillance systems, suspicious person detection, detection of...
Over-Voltage Protection Circuit for Tripping & Switching of 220V Appliances Using Relay Moduleand Python-Based Algo
Mitigating the risk of appliance damage caused by overvoltage conditions is a critical aspect of ensuring electrical safety and reliability. This study presents a novel "Over Voltage Protection Circuit for Tripping an...