Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware
- Authors
-
-
Zainab B. LAPAI
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Joseph A. OJENIYI
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Ismail IDRIS
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Abdulkadir O. ABDULBAKI
Department of Telecommunications Engineering, Federal University of Technology, Minna, Nigeria
Author
-
Jennifer BALA
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Ransomware, classification, entropy features, multi-layer perceptron, deep learning, windows ransomware.
- Abstract
-
Ransomware attacks continue to escalate globally, exploiting strong encryption to block access to essential data and disrupt operations. Despite substantial research efforts, accurately distinguishing between ransomware families, especially in lightweight, resource-constrained environments remains a significant challenge. This study addresses that gap by developing a Multi-Layer Perceptron (MLP) classifier that leverages entropy-derived features for automated identification of 18 Windows ransomware families. Using 229 encrypted file samples, Shannon, Rényi, and sample entropy metrics were extracted, enhanced with statistical descriptors such as mean, variance, skewness, and kurtosis. These features formed the input to an MLP architecture with two ReLU-activated hidden layers, dropout regularization, and softmax output. The model was trained using Adam optimization, categorical cross-entropy loss, early stopping, and 5-fold cross-validation. The proposed approach achieved 94.7% accuracy, 94.3% precision, 93.8% recall, and ROC-AUC values above 0.90, demonstrating its effectiveness and suitability for scalable ransomware family classification.
- References
- Downloads
- Published
- 29-12-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Abba M. BALA, Abdurrauf G. SHARIFAI, Umar S. HARUNA, A Hybrid Deep Learning Model for Efficient Anomaly Detection in Video Surveillance Systems , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Ukange N. SYBIL, Hadiza A. UMAR, Ogar M. OKO, Habeebah A. KAKUDI, Usman MAHMUD, Alex AARON, Leveraging Quantum Machine Learning for Early Ovarian Cancer Diagnosis , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Caleb A. ABORISADE, Jide E.T. AKINSOLA, Ifeoluwa M. OLANIYI, Fathia O. ONIPEDE, Emmanuel A. OLAJUBU, Ganiyu A. ADEROUNMU, Machine Learning-Based Polycystic Ovary Syndrome Generative Modelling via Ensemble Learning and Neural Networks for Infertility Prediction , FUDMA Journal of Engineering and Technology: Vol. 1 No. 1 (2025): July 2025
- Oluwasanmi S. ADANIGBO, Opeyemi O. ASAOLU, Adedayo A. SOBOWALE, Temidayo AKINDAHUNSI, Akinbayode A. ASAOLU, Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Mokọ́ládé JOHNSON, Bashir SALIM, Enobong EQUERE, Miriam I. CHUKWUMA-UCHEGBU, Emma EKPO, Ali B. ABDULSALAM, Conserving Indigenous Geometries: A Vital Approach to Integrating Cultural Heritage into Architectural Education , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Suleiman ZUBAIR, Hassan ABDULAZEEZ, Bala A. SALIHU, Abubakar A. SHUAIBU, Design and Implementation of a BLE 5.0-Enabled Wearable Finger Mouse Using the XIAO nRF52840 Platform , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Adekunle O. ADEWOLE, Ayodeji O. ARIYO, Development of an Edge-Enabled IoT Smart Energy Meter with Artificial Intelligence (AI)-Based Load Prediction for Device-Level Monitoring , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Damilare L. ADEKEYE, Uche M. IROKA, A Microcontroller-Based Intelligent Electricity Theft Detection and Prevention System , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Taiwo J. DURODOLA, Suleiman ZUBAIR, James AGAJO, Open Radio Access Network (ORAN) Deployment Strategies for Remote Areas , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abubakar LAWAL, Abdulkadir O. ABDULBAKI, Nathaniel SALAWU, Bala A. SALIHU, Mamman A. THOMAS, Abraham U. USMAN, Sub-6 GHz Millimeter-Wave Metamaterial Antenna with Reconfigurable Radiation Patterns for Enhanced Wireless Communication , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
