Call For Paper - Upcoming Conferences

Research Article | Open Access | Download PDF
Volume 13 | Issue 4 | Year 2026 | Article Id. IJECE-V13I4P116 | DOI : https://doi.org/10.14445/23488549/IJECE-V13I4P116

Improved Generative Adversarial Network-based Ransomware Attack Detection Model with Enhanced Normalization Technique


G. Badrinath, Arpita Gupta

Received Revised Accepted Published
12 Jan 2026 14 Feb 2026 16 Mar 2026 30 Apr 2026

Citation :

G. Badrinath, Arpita Gupta, "Improved Generative Adversarial Network-based Ransomware Attack Detection Model with Enhanced Normalization Technique," International Journal of Electronics and Communication Engineering, vol. 13, no. 4, pp. 203-211, 2026. Crossref, https://doi.org/10.14445/23488549/IJECE-V13I4P116

Abstract

Generative Adversarial Network (GAN) has turned out to be one of the most devastating types of ransomware attack detection models, with enhanced normalization technique being the order of the day in most sectors. GAN methods of ransomware detection tend to be problematic in data Preprocessing, input dataset, and behavioural logs. In this paper, a better modification of GAN-based ransomware attack detection is proposed, which adds a framework such as a generator (G), discriminator (D), and auxiliary classifier (C). To achieve a better data representation, the GAN is used with Enhanced Normalization, with the enhancement of the normalization that stabilizes and reduces the occurrence of the mode collapse problem. Empirical tests reveal that the model under consideration is an improvement over traditional GAN-based and Map, instance normalization, Layer normalization, and hybrid normalization. Classifier Integration comprises the increased computational cost of adversarial training, the need for sigmoid activation, learning rate, total objective function, training, and Optimization when deploying in real-time scenarios on limited systems. Future directions will center on the optimization of lightweight flavors of the proposed model, the incorporation of federated learning as a privacy-preserving detection mechanism, and cross-domain generalization as a means of increasing protection to previously unseen ransomware families.

Keywords

Ransomware Attack Detection Model, Generative Adversarial Network, Enhanced Normalization, Cybersecurity, Classifier Integration.

References

  1. Xueqin Zhang, Jiyuan Wang, and Shinan Zhu, “Dual Generative Adversarial Networks Based Unknown Encryption Ransomware Attack Detection,” IEEE Access, vol. 10, pp. 900-913, 2022.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  2. Dongyang Li, Daisuke Kotani, and Yasuo Okabe, “Improving Attack Detection Performance in NIDS Using GAN,” 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, pp. 817-825, 2020.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  3. Xueqin Zhang et al., “Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks,” IEEE Access, vol. 8, pp. 10989-10996, 2020.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  4. Paulo Freitas de Araujo-Filho et al., “Intrusion Detection for Cyber–Physical Systems Using Generative Adversarial Networks in Fog Environment,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6247-6256, 2021.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  5. Ahmad O. Almashhadani et al., “A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware,” IEEE Access, vol. 7, pp. 47053-47067, 2019.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  6. Jannatul Ferdous et al., “AI-Based Ransomware Detection: A Comprehensive Review,” IEEE Access, vol. 12, pp. 136666-136695, 2024.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  7. B.J Chinmaya, Sujay Arun Kudtarkar, and Mohana, “Targeted Ransomware Attacks and Detection to Strengthen Cybersecurity Strategies,” 2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India, pp. 1039-1044, 2023.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  8. Salwa Razaulla et al., “The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions,” IEEE Access, vol. 11, pp. 40698-40723, 2023.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  9. Mohammad Wazid, Ashok Kumar Das, and Sachin Shetty, “BSFR-SH: Blockchain-Enabled Security Framework against Ransomware Attacks for Smart Healthcare,” IEEE Transactions on Consumer Electronics, vol. 69, no. 1, pp. 18-28, 2023.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  10. Umara Urooj et al., “Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks,” IEEE Access, vol. 12, pp. 3910-3925, 2024.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  11. Usman Javed Butt et al., “Ransomware Threat and its Impact on SCADA,” 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK, pp. 205-212, 2019.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  12. Umara Urooj, Mohd Aizaini Bin Maarof, and Bander Ali Saleh Al-rimy, “A Proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model,” 2021 3rd International Cyber Resilience Conference (CRC), Langkawi Island, Malaysia, pp. 1-6, 2021.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  13. Zhor Ismaili et al., “Toward a New Approach Based on Conditional Tabular Generative Adversarial Network for Ransomware Attack Detection in IoT Systems,” 2025 International Conference on Intelligent Systems: Theories and Applications (SITA), Rabat, Morocco, pp. 1-6, 2025.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  14. Bishal Kc, Shushant Sapkota, and Ashish Adhikari, “Generative Adversarial Networks in Anomaly Detection and Malware Detection: A Comprehensive Survey,” Advances in Artificial Intelligence Research, vol. 4, no. 1, pp. 18-35, 2024.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  15. Ghebrebrhan Gebrehans et al., “Generative Adversarial Networks for Dynamic Malware Behavior: A Comprehensive Review, Categorization, and Analysis,” IEEE Transactions on Artificial Intelligence, vol. 6, no. 8, pp. 1955-1976, 2025.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  16. Song Han et al., “Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges,” IEEE Systems Journal, vol. 8, no. 4, pp. 1052-1062, 2014.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  17. Tharindu Lakshan Yasarathna, Madhusanka Liyanage, and Nhien-An Le-Khac, “Deep Learning-Based Autonomous Anomaly Detection for Security in SDN-IoT Networks,” IEEE Open Journal of the Communications Society, vol. 6, pp. 8007-8048, 2025.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  18. Wanning Liu et al., “ETFIDS: An Entropy-Driven, Time-Frequency Analysis Framework for In-Vehicle CAN Signal Intrusion Detection,” IEEE Internet of Things Journal, vol. 12, no. 12, pp. 21507-21522, 2025.
    [
    CrossRef] [Google Scholar] [Publisher Link]
  19. Xingxing Wang et al., “Intrusion Detection for Intelligent Vehicle CAN Bus Based on Tsetlin Machine,” 2024 8th CAA International Conference on Vehicular Control and Intelligence (CVCI), Chongqing, China, pp. 1-5, 2024.
    [
    CrossRef] [Google Scholar] [Publisher Link]