Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment
- Authors
-
-
Joseph A. OJENIYI
Department of Cyber Security, Federal University of Technology, Minna, Nigeria
Author
-
Zainab L. BELLO
Department of Cyber Security, Federal University of Technology, Minna, Nigeria
Author
-
Ismail IDRIS
Department of Cyber Security, Federal University of Technology, Minna, Nigeria
Author
-
Noel M. DOGONYARO
Department of Cyber Security, Federal University of Technology, Minna, Nigeria
Author
-
Suleiman AHMAD
Department of Cyber Security, Federal University of Technology, Minna, Nigeria
Author
-
Sikiru O. SUBAIRU
Department of Cyber Security, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Cybersecurity, cryptography, entropy, multi-layer perceptron, ransomware.
- Abstract
-
Ransomware poses a critical cybersecurity challenge, exploiting strong encryption to deny access to data and evade traditional detection methods. Conventional techniques such as signature and heuristic-based detection often fail against modern variants due to polymorphism, obfuscation, and ransomware-as-a-service (RaaS) models. This study proposes an entropy-based deep learning framework for classifying Windows ransomware families, leveraging entropy’s ability to quantify the randomness introduced by encryption. Encrypted files exhibit higher entropy values (>7.5) compared to benign files (4.5–6.0), making entropy a reliable feature for ransomware detection. In this work, ransomware samples from 18 families were executed in a controlled virtual box windows 10 environment to generate encrypted datasets across multiple file types. Shannon, Rényi, and sample entropy measures, alongside statistical descriptors, were extracted and transformed into normalized feature vectors for classification using a multi-layer perceptron (MLP) model. Experimental results revealed distinct entropy patterns across ransomware families, with the proposed framework achieving efficient training convergence and robust generalization. The model achieved accuracy 94.7%, 94.3% precision, 93.8% recall and FI-score of 94.0%. The findings confirm entropy’s effectiveness as a scalable and resilient feature, supporting accurate ransomware family classification and enhancing real-time detection and forensic analysis.
- References
- Downloads
- Published
- 22-12-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Zainab B. LAPAI, Joseph A. OJENIYI, Ismail IDRIS, Abdulkadir O. ABDULBAKI, Jennifer BALA, Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Lukman MOHAMMED, Victor O. WAZIRI, Ismaila IDRIS, Suleiman AHMAD, Performance Assessment of Android Antimalware Applications: An Experimental Approach , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Ojochide P. DAMIAN, Fadimatu N. DABAI, Abdulwasiu ABDURRAHMAN, Kamiludeen OLANREWAJU, Bilyamin ABDULMUMIN, Grace A. OLUGBENGA, A Simulation-Driven Strategy for Improved Expandable Polystyrene Synthesis via Multi-Stage Initiator Dosing , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Yusuf T. BAFFA, Muhammad Y. MUHAMMAD, Aliyu SHUAIBU, Enhanced Detection and Classification Models for Distributed Denial-of-Service Using Time-Based Features in Cybersecurity , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Oluwadare J. AKINDUGBAGBE, Adefope OWOJORI, Emmanuel AGBENYI, Babatunde ADEBO, Gamma Shielding Capabilities of Some Selected Materials Within Ibadan Metropolis , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Idris M. WADA, Abba IBRAHIM, Genesis ISHAYA, Performance Evaluation of Climate Products with Validation Using Bootstrapping and Climate Extremes in the Hadejia-Jama’are River Basin, Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Cyril OCHERI, Victor S. AIGBODION, Esther O. AMEH, Ihebuchuwu C. EZEAKU, Chibuikem A. OKAFOR, Uchenna C. AMAZUE, Eddy R. OMONIGHO, Electrochemical Analysis of Azadirachta indica Leaves as a Corrosion inhibitor on Mild Steel in 1 M H2SO4 , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Ukange N. SYBIL, Hadiza A. UMAR, Ogar M. OKO, Habeebah A. KAKUDI, Usman MAHMUD, Alex AARON, Leveraging Quantum Machine Learning for Early Ovarian Cancer Diagnosis , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Mohammed U. GARBA, Musa A. ABDULLAHI, Isah RABI, Saadatu A. GORO, Habibu UTHMAN, Abubakar S. MOHAMMED, Umaru AHMADU, Usman S. ONODUKU, Recovery of Lithium Carbonate from Nigerian Lepidolite Ore via Roasting-Leaching-Precipitation , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Oluwaseun S. OGUNGBEMI, Geophysical Approach to Groundwater Resource Appraisal in Afe Babalola University, Ado-Ekiti, Southwestern Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Lukman MOHAMMED, Victor O. WAZIRI, Ismaila IDRIS, Suleiman AHMAD, Performance Assessment of Android Antimalware Applications: An Experimental Approach , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Zainab B. LAPAI, Joseph A. OJENIYI, Ismail IDRIS, Abdulkadir O. ABDULBAKI, Jennifer BALA, Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
