Automated Ransomware Detection Using Hierarchical Encryption Deviation Analysis
Listed in
This article is not in any list yet, why not save it to one of your lists.Abstract
The increasing reliance on encryption in cyberattacks has highlighted the urgent need for detection systems capable of addressing sophisticated adversarial techniques. A multi-layered approach known as Hierarchical Encryption Deviation Analysis (HEDA) was developed, offering precise anomaly detection through the analysis of cryptographic deviations across hierarchical layers. The framework achieved high detection accuracy, exceeding 92\% for modern ransomware variants, including LockBit, Hive, BlackCat, and Conti, while maintaining low false positive rates, particularly for benign encrypted files. Its scalability was demonstrated through stress tests involving large datasets, where minimal latency and resource usage ensured compatibility with real-time operational requirements. A comparative evaluation against signature-based and behavior-based detection systems revealed superior performance in detecting polymorphic ransomware and adversarially crafted samples. The modular system design enabled seamless integration into existing security infrastructures, while energy-efficient processing addressed sustainability concerns in enterprise environments. Experimental results further highlighted the system’s robustness in high-bandwidth network conditions, where rapid processing and adaptability were maintained across varying levels of traffic. Through detailed cryptographic analysis, the framework effectively isolated malicious behaviors, even in cases involving complex encryption schemes and high randomness. The study also emphasized the practicality of integrating anomaly detection techniques with machine learning models to provide a scalable and adaptable solution for ransomware mitigation. By focusing on hierarchical structures, the methodology supports a comprehensive evaluation of encryption patterns, ensuring robust detection capabilities across diverse operational scenarios. The findings contribute significantly to advancing the field of cybersecurity, offering actionable strategies for combating encryption-based threats in an increasingly hostile cyber landscape.