The popularity of ransomware has created a unique ecosystem of cybercriminals. The signature-based methods employed by antivirus software are insuf?cient to evade ransomware attacks due to code obfuscation techniques and creation of new polymorphic variants every day. Generic malware attack vectors
Cyber Threat Detection And Prevention Using Machine Learning
The popularity of ransomware has created a unique ecosystem of cybercriminals. The signature-based methods employed by antivirus software are insuf?cient to evade ransomware attacks due to code obfuscation techniques and creation of new polymorphic variants every day. Generic malware attack vectors are also not robust enough for detection as they do not completely track the speci?c behavioral patterns shown by ransomware families.
We have proposed a dynamic ransomware detection system using machine learning techniques (which is a part of the intelligent threat analysis technology) such as Random Forest (RF), Support Vector Machine (SVM), Simple Logistic (SL) and Naive Bayes (NB) algorithms for detecting and classification of known and unknown ransomware. In order to improve the performance of detection and classi?cation of threat, it was built in a hybrid way such as applying an unsupervised learning approach with unlabeled data, naming clusters with labeled data, and using a supervised learning approach for feature selection. We also setup a network configuration using Squid proxy. This technique involves a proxy (or main server), where our detection and classification part is implemented to provide cache services to the clients. It redirects client requests from web browsers to the proxy server and delivers the client’s request (if it is not a ransom attack) and keeps a copy of it in the proxy as cache.
To conclude, future needs are very critical and innovative approach towards this menace is required. Our proposed cybersecurity approach gives our system more credibility and robustness, which will enhance the security and saves the confidentiality of Networks including corporate banks.

The aim of this project is to design a machine learning based system to protect valuable information. Following are the project objectives,
These objectives form the confidentiality, integrity, availability (CIA) triad, the basis of all security programs. This model is also referred to as the AIC (Availability, Integrity, and Confidentiality). The elements of the triad are considered the three most crucial components of security.
Our project is based on machine learning based network configuration. The methodology adapted is as follows.

Cyber-attacks are experienced nearly by all the Internet users. It disturbs the whole system of metropolis causing electricity blackouts, shutdown of subway systems, damage to corporates costing millions in loss through attacks like ransomware.
Following are the benefits of Machine Learning based Cyber Security System
The developed system configuration consists of following required components.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| GeForce GTX 1650. | Equipment | 1 | 36999 | 36999 |
| 4-Port Gigabit Network Card | Equipment | 2 | 5369 | 10738 |
| TL-SG1008MP | Equipment | 1 | 22200 | 22200 |
| Tp-Link TL-WR840N Ver 3.0 | Miscellaneous | 1 | 3000 | 3000 |
| CAT 6 STP cable | Miscellaneous | 2 | 1500 | 3000 |
| Total in (Rs) | 75937 |
Nothing is more important than saving human lives. In this 21 st century where terrorism i...
This project's concept is based on the most popular website in and outside Pakistan (daraz...
The portable battery-powered hybrid (Solar + Electric) power tiller machine was the subjec...
Autonomous vehicles are automobiles that can move without any intervention by detecting th...
The modern lifestyle or fast-forward life has a significant impact on the lives of people....