Table 11 Comparison of our method with existing recent relevant works in the literature.
Paper | Model | Analysis technique | Feature type | Threat type | Accuracy (%) |
|---|---|---|---|---|---|
VGG416 | Static | Image | Malware | 91.41 | |
VGG416 | Hybrid | Image | Malware | 94.70 | |
Xception ColSeq | Static | Image | Malware | 98.20 | |
ResNet50 | Static | Image | Malware | 99.50 | |
ResNet50 | Static | Image | Malware | 98.61 | |
ResNet50 | Static | Image | Malware | 98.62 | |
Xception CNN | Static | Image | Malware | 99.20 | |
Logistic Regression (RLR) | Dynamic | CSV | Ransomware | 96.34 | |
CNN | Dynamic | CSV | Ransomware | 95.90 | |
Random forest | Dynamic | CSV | Ransomware | 97.28 | |
CNN, LSTM, MLP | Static + Dynamic | Image + CSV | Ransomware | 98.75 | |
2-layered CNN | Dynamic | CSV | Ransomware | 98.20 | |
Our proposed method | ResNet50 | Dynamic | Image (from CSV) | Ransomware | 99.96 |