Exploring Deep Learning Approaches for Ransomware Detection: A Comprehensive Survey

Prasanna Kumar G. 1
D. Rajeshwari 2
Rajeshwari Dembala 2
Darshini Y 3
Darshini Yoge Gowda 3
Ajay Kumar 4
M. V. Manoj Kumar 5
Hardik Gohel 6, 7
1
 
Cachetech Education and Research Foundation, Mysuru, Karnataka, India
2
 
The National Institute of Engineering, Mysuru, Karnataka, India
3
 
ATME College of Engineering, Mysuru, Karnataka, India
5
 
Nitte Meenakshi Institute of Technology, Yelahanka, Bengaluru, India
Publication typeJournal Article
Publication date2025-02-01
scimago Q3
SJR0.223
CiteScore3.0
Impact factor
ISSN26662558, 26662566
Abstract
Abstract:

Ransomware, a form of malicious software originating from cryptovirology, poses a serious threat by coercing victims to pay a ransom under the risk of exposing their data or permanently restricting access. While basic ransomware may lock a system without causing harm to files, more sophisticated variants utilize cryptoviral extortion techniques. The danger of ransomware is significant, with ongoing discoveries of new strains and families on the internet and dark web. Recovering from ransomware infections is challenging due to the complex encryption schemes employed. The exploration of machine learning and deep learning methods for ransomware detection is crucial, as these technologies can identify zero-day threats. This survey delves into research contributions on the detection of ransomware using deep learning algorithms. With deep learning gaining prominence in cybersecurity, we aimed to explore techniques for ransomware detection, assess weaknesses in existing deep learning approaches, and propose enhancements using those deep learning algorithms. Machine learning algorithms can be employed to tackle worldwide computer security challenges, encompassing the detection of malware, recognition of ransomware, detection of fraud, and identification of spoofing attempts. Machine learning algorithms play a crucial role in assessing prevalent forms of cyber security risks. They are instrumental in identifying and mitigating attacks, conducting vulnerability scans, and evaluating the risks associated with the public internet. By leveraging machine learning, computer defense mechanisms can effectively identify and respond to various cyber threats. These techniques aid in fortifying systems against potential vulnerabilities and enhance the overall security posture. Research in this field investigates the utilization of cyber training in both defensive and offensive contexts, offering insights into the intersection of cyber threats and machine learning techniques.

Found 
Found 

Top-30

Publishers

1
Institute of Electrical and Electronics Engineers (IEEE)
1 publication, 100%
1
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
1
Share
Cite this
GOST |
Cite this
GOST Copy
G. P. K. et al. Exploring Deep Learning Approaches for Ransomware Detection: A Comprehensive Survey // Recent Advances in Computer Science and Communications. 2025. Vol. 17. No. 2.
GOST all authors (up to 50) Copy
G. P. K., Rajeshwari D., Dembala R., Y D., Gowda D. Y., Kumar A., Manoj Kumar M. V., Gohel H. Exploring Deep Learning Approaches for Ransomware Detection: A Comprehensive Survey // Recent Advances in Computer Science and Communications. 2025. Vol. 17. No. 2.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.2174/0126662558279673240515054741
UR - https://www.eurekaselect.com/230472/article
TI - Exploring Deep Learning Approaches for Ransomware Detection: A Comprehensive Survey
T2 - Recent Advances in Computer Science and Communications
AU - G., Prasanna Kumar
AU - Rajeshwari, D.
AU - Dembala, Rajeshwari
AU - Y, Darshini
AU - Gowda, Darshini Yoge
AU - Kumar, Ajay
AU - Manoj Kumar, M. V.
AU - Gohel, Hardik
PY - 2025
DA - 2025/02/01
PB - Bentham Science Publishers Ltd.
IS - 2
VL - 17
SN - 2666-2558
SN - 2666-2566
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@article{2025_G.,
author = {Prasanna Kumar G. and D. Rajeshwari and Rajeshwari Dembala and Darshini Y and Darshini Yoge Gowda and Ajay Kumar and M. V. Manoj Kumar and Hardik Gohel},
title = {Exploring Deep Learning Approaches for Ransomware Detection: A Comprehensive Survey},
journal = {Recent Advances in Computer Science and Communications},
year = {2025},
volume = {17},
publisher = {Bentham Science Publishers Ltd.},
month = {feb},
url = {https://www.eurekaselect.com/230472/article},
number = {2},
doi = {10.2174/0126662558279673240515054741}
}