classification. Finally, misclassified the Jigsaw as the
CryptoLocker because of “RegSetValueExW”,
“RegOpenKeyExW”, “NtOpenKey”, “connect”,
“Process3
2NextW”, “Process32FirstW” have the al-
most same affection on classification. From the re-
sults, as can be seen, the APIs that affect the classifi-
cation of each ransomware family is different. There-
fore, we can select APIs which have a great effect on
the classification of the ransomware family by the fig-
ure shown in Figure 5 when we want to propose a
method to detect or classify the ransomware.
But our proposed method has weaknesses that by
calling useless APIs to change the ransomware be-
havior pattern. We rely on the correlation coefficient
between API groups to classify ransomware variants,
so if the ransomware maker deliberately calls a large
number of useless APIs, the accuracy of our proposed
method will be greatly reduced. For example, as
shown in Figure 1, CryptoLocker and Jigsaw’s FC
and FS values are very similar. In this case, if an at-
tacker calls a large number of file-related APIs, then
our proposed method will be difficult to classify
CryptoLocker and Jigsaw.
7 CONCLUSION
In this study, we proposed a method for extracting the
calling frequency of an API from a report generated
by the dynamic analysis of the ransomware, obtaining
Pearson correlation coefficients, using them as fea-
ture quantities and then classifying the ransomware
via SVM. effective. We also found that it was possi-
ble to determine the types of APIs that influence the
classification of each ransomware family, and it is
thought that this capability could reduce the analysis
time required by other ransomware researchers.
As additional future tasks, we intend to explore
more features and samples and use them to improve
our proposed method.
REFERENCES
Check Point Software Technologies Ltd (2018, Sept). 2018
Information Security Report: Future Cyber Security.
Retrieved from http://www.checkpoint.co.jp/re-
sources/cyber-security-report-2018/2018-security-re-
port-web_Low-Reso.pdf.
Pearson, K. (1895). Notes on Regression and Inheritance in
the Case of Two Parents Proceedings of the Royal So-
ciety of London, 58, 240-242.
Scipy.org (2010, Oct.). Retrieved from
https://docs.scipy.org/doc/numpy/.
Anderson, B., Storlie, C., & Lane, T. (2012). Improving
malware classification: Bridging the static/dynamic
gap. Proceedings of the ACM Conference on Computer
and Communications Security, 3–14.
https://doi.org/10.1145/2381896.2381900
Alazab, M., Venkataraman, S., & Watters, P. (2010).
Towards understanding malware behaviour by the
extraction of API calls. Proceedings - 2nd Cybercrime
and Trustworthy Computing Workshop, CTC 2010, 52–
59. https://doi.org/10.1109/CTC.2010.8
Chandramohan, M., Tan, H. B. K., Briand, L. C., Shar, L.
K., & Padmanabhuni, B. M. (2013). A scalable
approach for malware detection through bounded
feature space behavior modeling. 2013 28th IEEE/ACM
International Conference on Automated Software
Engineering, ASE 2013 - Proceedings.
https://doi.org/10.1109/ASE.2013.6693090
Dahl, G. E., Stokes, J. W., Deng, L., & Yu, D. (2013).
Large-scale malware classification using random
projections and neural networks. ICASSP, IEEE
International Conference on Acoustics, Speech and
Signal Processing - Proceedings, 3422–3426.
https://doi.org/10.1109/ICASSP.2013.6638293
EE Osuna. (1998). Support Vector Machine:Training and
Application. Doctoral Dissertation, Massachusetts
Institue of Technology.
Galal, H. S., Mahdy, Y. B., & Atiea, M. A. (2016).
Behavior-based features model for malware detection.
Journal of Computer Virology and Hacking
Techniques. https://doi.org/10.1007/s11416-015-0244-
0
Gandotra, E., Bansal, D., & Sofat, S. (2014). Malware
Analysis and Classification: A Survey. Journal of
Information Security, 05(02), 56–64.
https://doi.org/10.4236/jis.2014.52006
Hampton, N., Baig, Z., & Zeadally, S. (2018). Ransomware
behavioural analysis on windows platforms. Journal of
Information Security and Applications, 40, 44–51.
https://doi.org/10.1016/j.jisa.2018.02.008
Hull, G., John, H., & Arief, B. (2019). Ransomware
deployment methods and analysis: views from a
predictive model and human responses. Crime Science,
8(1). https://doi.org/10.1186/s40163-019-0097-9
Idika, N., & Mathur, A. P. (2007). A Survey of Malware
Detection Techniques. Purdue University, 48, 2.
Islam, R., Tian, R., Batten, L. M., & Versteeg, S. (2013).
Classification of malware based on integrated static and
dynamic features. Journal of Network and Computer
Applications, 36(2), 646–656.
https://doi.org/10.1016/j.jnca.2012.10.004
Jung, S., & Won, Y. (2018). Ransomware detection method
based on context-aware entropy analysis. Soft
Computing, 22(20), 6731–6740. https://doi.org/
10.1007/s00500-018-3257-z
Kakisim, A. G., Nar, M., Carkaci, N., & Sogukpinar, I.
(2019). Analysis and evaluation of dynamic feature-
based malware detection methods. Lecture Notes in
Computer Science (Including Subseries Lecture Notes
in Artificial Intelligence and Lecture Notes in