Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Ensemble machine learning for proactive android ransomware detection using network traffic
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 18 February 2026

Ensemble machine learning for proactive android ransomware detection using network traffic

  • G. Kirubavathi1,
  • B. Padma Mayuri1,
  • S. Pranathasree1,
  • Rajeswari Alagappan1,
  • Amal Ajayan1,
  • Waleed M. Ismael2 &
  • …
  • Ateeq Ur Rehman3 

Scientific Reports , Article number:  (2026) Cite this article

  • 516 Accesses

  • 1 Altmetric

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Computational science
  • Computer science
  • Information technology

Abstract

Android ransomware has emerged as a major threat to mobile ecosystems, leveraging obfuscated payloads and dynamic command-and-control channels to evade conventional detection systems. Existing approaches often rely on static, batch-trained models that lack adaptability to evolving threat behaviors, resulting in degraded accuracy over time due to concept drift. This presents a critical challenge for real-time deployment, as new ransomware variants continually mutate their signatures and alter network traffic patterns to evade detection. To bridge this gap, this study proposes a robust ensemble-based machine learning framework for proactive detection of Android ransomware using network traffic metadata. The framework integrates advanced classifiers, including Light Gradient Boosting Machine, eXtreme Gradient Boosting Machine, and Random Forest, with Synthetic Minority Oversampling Technique enhanced stratified cross-validation to mitigate class imbalance and improve generalizability. Furthermore, explainable artificial intelligence methods such as SHapley Additive exPlanations and Local Interpretable Model-Agnostic Explanations are employed to enhance interpretability and analyst trust. In the context of ransomware detection, the importance of online learning lies in its ability to adapt to evolving threat patterns in real time. Ransomware frequently mutates payload signatures and obfuscates behavioral traces, causing traditional models to deteriorate under changing data distributions. To address this, we conducted a concept drift evaluation using an incremental LightGBM model, tested on chronologically partitioned traffic data across five temporal blocks. This approach enables continuous adaptation to new data streams without requiring full retraining, thereby maintaining detection robustness and reducing false negatives in production. Experimental results on a balanced dataset demonstrate that LightGBM achieves the highest classification performance, indicating the efficacy and adaptability of the proposed framework for real-time Android ransomware mitigation in dynamic network environments.

Data availability

The datasets analyzed during the current study are available in the IEEE DataPort and Kaggle repository at https: //dx.doi.org/10.21227/d744-tb96 and https://doi.org/10.34740/KAGGLE/DSV/4987535

References

  1. Qureshi, S. U. et al. Systematic review of deep learning solutions for malware detection and forensic analysis in iot. J. King Saud Univ. Comput. Inf. Sci. 36, 102164. https://doi.org/10.1016/j.jksuci.2024.102164 (2024).

    Google Scholar 

  2. Aslan, Ö., Aktug, S. S., Ozkan-Okay, M., Yilmaz, A. A. & Akin, E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics12, 8576. https://doi.org/10.3390/electronics12061333 (2023).

  3. Begovic, K., Al-Ali, A. & Malluhi, Q. Cryptographic ransomware encryption detection: survey. Comput. Secur. 132, 103349. https://doi.org/10.1016/j.cose.2023.103349 (2023).

    Google Scholar 

  4. Muhammad, Z. et al. Smartphone security and privacy: a survey on apts, sensor-based attacks, side-channel attacks, google play attacks, and defenses. Technologies11, 74523. https://doi.org/10.3390/technologies11030076 (2023).

  5. Ferdous, J., Islam, R., Mahboubi, A. & Islam, M. Z. A survey on ml techniques for multi-platform malware detection: Securing pc, mobile devices, iot, and cloud environments. Sensors25, 8596. https://doi.org/10.3390/s25041153 (2025).

  6. Razgallah, A., Khoury, R., Hallé, S. & Khanmohammadi, K. A survey of malware detection in android apps: recommendations and perspectives for future research. Comput. Sci. Rev. 39, 100358. https://doi.org/10.1016/j.cosrev.2020.100358 (2021).

    Google Scholar 

  7. Hossain, M. A. et al. Towards superior android ransomware detection: an ensemble machine learning perspective. Cyber Secur. Appl. 3, 100076. https://doi.org/10.1016/j.csa.2024.100076 (2025).

    Google Scholar 

  8. Yan, P. & Talaei Khoei, T. Securing the internet of things: a comprehensive review of ransomware attacks, detection, countermeasures, and future prospects. Franklin Open 11, 100256. https://doi.org/10.1016/j.fraope.2025.100256 (2025).

    Google Scholar 

  9. Albshaier, L., Almarri, S. & Rahman, M. M. H. Earlier decision on detection of ransomware identification: A comprehensive systematic literature review. Information 15, 748. https://doi.org/10.3390/info15080484 (2024).

  10. Al-Kadhimi, A. A., Singh, M. M. & Khalid, M. N. A. A systematic literature review and a conceptual framework proposition for advanced persistent threats (apt) detection for mobile devices using artificial intelligence techniques. Appl. Sci. 13, 85963. https://doi.org/10.3390/app13148056 (2023).

  11. Alraizza, A. & Algarni, A. Ransomware detection using machine learning: a survey. Big Data Cogn. Comput. 7, 8596. https://doi.org/10.3390/bdcc7030143 (2023).

  12. Almotiri, S. H. Ai driven iomt security framework for advanced malware and ransomware detection in sdn. J. Cloud Comput. 14, 19. https://doi.org/10.1186/s13677-025-00745-w (2025).

    Google Scholar 

  13. Joshi, Y. S., Mahajan, H., Joshi, S. N., Gupta, K. P. & Agarkar, A. A. Signature-less ransomware detection and mitigation. J. Comput. Virol. Hack. Tech. 17, 299–306. https://doi.org/10.1007/s11416-021-00384-0 (2021).

    Google Scholar 

  14. Mohamed, N. Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowl. Inf. Syst. https://doi.org/10.1007/s10115-025-02429-y (2025).

    Google Scholar 

  15. Lu, H. et al. Autod: Intelligent blockchain application unpacking based on jni layer deception call. IEEE Netw. 35, 215–221. https://doi.org/10.1109/MNET.011.2000467 (2021).

    Google Scholar 

  16. Lu, H. et al. Deepautod: research on distributed machine learning oriented scalable mobile communication security unpacking system. IEEE Trans. Netw. Sci. Eng. 9, 2052–2065. https://doi.org/10.1109/TNSE.2021.3100750 (2022).

    Google Scholar 

  17. Amer, E. & El-Sappagh, S. Robust deep learning early alarm prediction model based on the behavioural smell for android malware. Comput. Secur. 116, 102670. https://doi.org/10.1016/j.cose.2022.102670 (2022).

    Google Scholar 

  18. Hull, G., John, H. & Arief, B. Ransomware deployment methods and analysis: views from a predictive model and human responses. Crime Sci. 8, 2. https://doi.org/10.1186/s40163-019-0097-9 (2019).

    Google Scholar 

  19. Guerra-Manzanares, A., Luckner, M. & Bahsi, H. Concept drift and cross-device behavior: challenges and implications for effective android malware detection. Comput. Secur. 120, 102757. https://doi.org/10.1016/j.cose.2022.102757 (2022).

    Google Scholar 

  20. Almohaini, R., Almomani, I. & AlKhayer, A. Hybrid-based analysis impact on ransomware detection for android systems. Appl. Sci. 11, 4853. https://doi.org/10.3390/app112210976 (2021).

  21. Gu, J., Zhu, H., Han, Z., Li, X. & Zhao, J. Gsedroid: Gnn-based android malware detection framework using lightweight semantic embedding. Comput. Secur. 140, 103807. https://doi.org/10.1016/j.cose.2024.103807 (2024).

    Google Scholar 

  22. Hsu, R.-H. et al. A privacy-preserving federated learning system for android malware detection based on edge computing. In 2020 15th Asia Joint Conference on Information Security (AsiaJCIS) 128–136 (2020). https://doi.org/10.1109/AsiaJCIS50894.2020.00031.

  23. Karat, G. et al. Cnn-lstm hybrid model for enhanced malware analysis and detection. Procedia Comput. Sci. 233, 492–503. https://doi.org/10.1016/j.procs.2024.03.239 (2024).

  24. Muzaffar, A., Ragab Hassen, H., Lones, M. A. & Zantout, H. An in-depth review of machine learning based android malware detection. Comput. Secur. 121, 102833. https://doi.org/10.1016/j.cose.2022.102833 (2022).

    Google Scholar 

  25. Meijin, L. et al. A systematic overview of android malware detection. Appl. Artif. Intell. 36, 2007327. https://doi.org/10.1080/08839514.2021.2007327 (2022).

    Google Scholar 

  26. Mawoh, R. Y., Wacka, J. B. A., Tchakounte, F., Fachkha, C. & Kolyang. An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence. Sci. Rep. 15, 10680. https://doi.org/10.1038/s41598-025-86568-w (2025).

  27. Lu, T., Du, Y., Ouyang, L., Chen, Q. & Wang, X. Android malware detection based on a hybrid deep learning model. Secur. Commun. Netw. 2020, 8863617. https://doi.org/10.1155/2020/8863617 (2020).

  28. Ajayan, A., Kirubavathi, G. & Sarker, I. H. Distilxids: efficient, lightweight and explainable transformer-based language model for real-time network intrusion detection. Neurocomputing 668, 132398. https://doi.org/10.1016/j.neucom.2025.132398 (2026).

    Google Scholar 

  29. Sarker, I. H., Janicke, H., Mohsin, A., Gill, A. & Maglaras, L. Explainable ai for cybersecurity automation, intelligence and trustworthiness in digital twin: methods, taxonomy, challenges and prospects. ICT Express 10, 935–958. https://doi.org/10.1016/j.icte.2024.05.007 (2024).

    Google Scholar 

  30. Qi, P., Chiaro, D. & Piccialli, F. Small models, big impact: a review on the power of lightweight federated learning. Futur. Gener. Comput. Syst. 162, 107484. https://doi.org/10.1016/j.future.2024.107484 (2025).

    Google Scholar 

  31. Ispahany, J., Islam, M. R., Islam, M. Z. & Khan, M. A. Ransomware detection using machine learning: a review, research limitations and future directions. IEEE Access 12, 68785–68813. https://doi.org/10.1109/ACCESS.2024.3397921 (2024).

    Google Scholar 

  32. Hasan, R. et al. Enhancing malware detection with feature selection and scaling techniques using machine learning models. Sci. Rep. 15, 9122. https://doi.org/10.1038/s41598-025-93447-x (2025).

    Google Scholar 

  33. Albin Ahmed, A. et al. Android ransomware detection using supervised machine learning techniques based on traffic analysis. Sensors24, 596. https://doi.org/10.3390/s24010189 (2024).

  34. Amenova, S., Turan, C. & Zharkynbek, D. Android malware classification by cnn-lstm. In 2022 International Conference on Smart Information Systems and Technologies (SIST) 1–4 (IEEE, 2022). https://doi.org/10.1109/SIST54437.2022.9945816.

  35. Islam, R., Sayed, M. I., Saha, S., Hossain, M. J. & Masud, M. A. Android malware classification using optimum feature selection and ensemble machine learning. Internet Things Cyber-Phys. Syst. 3, 100–111. https://doi.org/10.1016/j.iotcps.2023.03.001 (2023).

    Google Scholar 

  36. Adeniyi, A. O., Olabiyisi, S. O., Adepoju, T. M. & Sanusi, B. A. Comparative analysis of some machine learning algorithms for the classification of ransomware. Int. J. Res. Sci. Innov. 12, 10256. https://doi.org/10.51244/IJRSI.2025.120800045 (2025).

  37. Prasad, A. Permguard android malware dataset. https://doi.org/10.1109/ACCESS.2024.3523629 (2024).

  38. Chakraborty, S. Android ransomware detection. https://doi.org/10.34740/KAGGLE/DSV/4987535 (2023).

Download references

Author information

Authors and Affiliations

  1. Department of Mathematics, Amrita School of Physical Sciences, Amrita Vishwa Vidyapeetham, Coimbatore, 641112, India

    G. Kirubavathi, B. Padma Mayuri, S. Pranathasree, Rajeswari Alagappan & Amal Ajayan

  2. Department of Information Technology, Faculty of Engineering, Azal University for Human Development, Sanaa, Yemen

    Waleed M. Ismael

  3. School of Computing, Gachon University, Seongnam-si, 13120, Republic of Korea

    Ateeq Ur Rehman

Authors
  1. G. Kirubavathi
    View author publications

    Search author on:PubMed Google Scholar

  2. B. Padma Mayuri
    View author publications

    Search author on:PubMed Google Scholar

  3. S. Pranathasree
    View author publications

    Search author on:PubMed Google Scholar

  4. Rajeswari Alagappan
    View author publications

    Search author on:PubMed Google Scholar

  5. Amal Ajayan
    View author publications

    Search author on:PubMed Google Scholar

  6. Waleed M. Ismael
    View author publications

    Search author on:PubMed Google Scholar

  7. Ateeq Ur Rehman
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Kirubavathi G.: Conceptualization, Data curation, Methodology, Supervision, Writing-original draft, Writing-review & editing. Padma Mayuri B.: Methodology, Data curation, Feature engineering, Writing-original draft. Pranathasree S.: Methodology, Software, Model development. Rajeswari Alagappan: Methodology, Software, implementation. Amal Ajayan: Software, Writing-original draft, Writing-review & editing. Waleed M. Ismael: Investigation, Experimental design, Writing-review & editing. Ateeq Ur Rehman: Supervision, Project administration, Result interpretation, Writing-review & editing. All authors have read and approved the final manuscript.

Corresponding authors

Correspondence to G. Kirubavathi, Waleed M. Ismael or Ateeq Ur Rehman.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kirubavathi, G., Padma Mayuri, B., Pranathasree, S. et al. Ensemble machine learning for proactive android ransomware detection using network traffic. Sci Rep (2026). https://doi.org/10.1038/s41598-026-38271-7

Download citation

  • Received: 05 June 2025

  • Accepted: 29 January 2026

  • Published: 18 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-38271-7

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Ransomware detection
  • Ransomware life cycle
  • Hybrid feature selection
  • Ensemble learning
  • Explainability analysis
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics