Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware
- Authors
-
-
Zainab B. LAPAI
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Joseph A. OJENIYI
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Ismail IDRIS
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Abdulkadir O. ABDULBAKI
Department of Telecommunications Engineering, Federal University of Technology, Minna, Nigeria
Author
-
Jennifer BALA
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Ransomware, classification, entropy features, multi-layer perceptron, deep learning, windows ransomware.
- Abstract
-
Ransomware attacks continue to escalate globally, exploiting strong encryption to block access to essential data and disrupt operations. Despite substantial research efforts, accurately distinguishing between ransomware families, especially in lightweight, resource-constrained environments remains a significant challenge. This study addresses that gap by developing a Multi-Layer Perceptron (MLP) classifier that leverages entropy-derived features for automated identification of 18 Windows ransomware families. Using 229 encrypted file samples, Shannon, Rényi, and sample entropy metrics were extracted, enhanced with statistical descriptors such as mean, variance, skewness, and kurtosis. These features formed the input to an MLP architecture with two ReLU-activated hidden layers, dropout regularization, and softmax output. The model was trained using Adam optimization, categorical cross-entropy loss, early stopping, and 5-fold cross-validation. The proposed approach achieved 94.7% accuracy, 94.3% precision, 93.8% recall, and ROC-AUC values above 0.90, demonstrating its effectiveness and suitability for scalable ransomware family classification.
- References
- Downloads
- Published
- 29-12-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Oluwasanmi S. ADANIGBO, Opeyemi O. ASAOLU, Adedayo A. SOBOWALE, Temidayo AKINDAHUNSI, Akinbayode A. ASAOLU, Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Adekunle O. ADEWOLE, Ayodeji O. ARIYO, Development of an Edge-Enabled IoT Smart Energy Meter with Artificial Intelligence (AI)-Based Load Prediction for Device-Level Monitoring , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Damilare L. ADEKEYE, Uche M. IROKA, A Microcontroller-Based Intelligent Electricity Theft Detection and Prevention System , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Usman A. ABDURRAHMAN, Abubakar A. ROGO, Abdulkadir A. BICHI, Akibu M. ABDULLAHI, Beyond Overload: Assessing Cognitive Load to Facilitate Learning Transfer in Virtual Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Ojochide P. DAMIAN, Fadimatu N. DABAI, Abdulwasiu ABDURRAHMAN, Kamiludeen OLANREWAJU, Bilyamin ABDULMUMIN, Grace A. OLUGBENGA, A Simulation-Driven Strategy for Improved Expandable Polystyrene Synthesis via Multi-Stage Initiator Dosing , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Emma S. EKPO, Mokọ́ládé JOHNSON, Constructing Meaning and Enhancing Well-Being: The Role of Place Attachment, Place Identity, and Sense of Place in Architectural Studio Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Oluwadare J. AKINDUGBAGBE, Adefope OWOJORI, Emmanuel AGBENYI, Babatunde ADEBO, Gamma Shielding Capabilities of Some Selected Materials Within Ibadan Metropolis , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Idris M. WADA, Abba IBRAHIM, Genesis ISHAYA, Performance Evaluation of Climate Products with Validation Using Bootstrapping and Climate Extremes in the Hadejia-Jama’are River Basin, Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Cyril OCHERI, Victor S. AIGBODION, Esther O. AMEH, Ihebuchuwu C. EZEAKU, Chibuikem A. OKAFOR, Uchenna C. AMAZUE, Eddy R. OMONIGHO, Electrochemical Analysis of Azadirachta indica Leaves as a Corrosion inhibitor on Mild Steel in 1 M H2SO4 , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Abubakar LAWAL, Abdulkadir O. ABDULBAKI, Nathaniel SALAWU, Bala A. SALIHU, Mamman A. THOMAS, Abraham U. USMAN, Sub-6 GHz Millimeter-Wave Metamaterial Antenna with Reconfigurable Radiation Patterns for Enhanced Wireless Communication , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
