Behavioral analysis of ransomware threats to ESXi Hypervisors: a machine learning-based predictive model
Article Sidebar
Issue Vol. 38 (2026)
-
Comparative analysis of Next.js and Astro frameworks
Patryk Gieda, Marek Miłosz1-5
-
Behavioral analysis of ransomware threats to ESXi Hypervisors: a machine learning-based predictive model
Upakar Bhatta6-10
-
Performance and usability evaluation of a VR virtual museum application
Kamil Gabrysiewicz, Krzysztof Dziedzic11-18
-
Comparative analysis of selected data visualization methods
Damian Węcławski, Radosław Tomczyk, Paweł Powroźnik19-25
-
A performance comparison of web programming interfaces: GraphQL, gRPC and Thrift
Piotr Rożek, Mariusz Dzieńkowski26-31
-
A review of security mechanisms in electronic payment systems
Omniah ALibrahim, Suhair Alshehri32-42
-
Clustering methods in machine learning
Bartłomiej Głuszczak, Paweł Powroźnik43-50
-
Comparative analysis of interpretable artificial intelligence methods
Aleksandra Kuszewska, Małgorzata Charytanowicz51-58
-
Comparative analysis of machine learning classifiers
Łukasz Krukowski, Grzegorz Kozieł59-65
-
Analysis of the impact of machine learning algorithms on the quality of generated sounds
Krzysztof Pedrycz, Mateusz Pikula66-72
-
Comparative analysis of the functionalities of applications supporting the self-control process of anticoagulation therapy
Marcin Furmaga, Vitalii Baida73-80
-
Application of machine learning for predicting Formula 1 race results
Sylwia Krzysztoń, Jakub Smołka81-86
-
Analysis of latency reduction and performance improvement methods in selected VR applications
Mateusz Czapczyński, Krzysztof Dziedzic87-94
-
Integrating deep learning image analysis into Web GIS applications: A Hybrid Flask - Spring Boot architecture for automated place detection
Medjon HYSENAJ95-101
Main Article Content
DOI
Sustainable Development Goals (SDG)
- Industry, Innovation, Technology and Infrastructure
Authors
Abstract
In today’s virtualized world, ransomware threats to ESXi hypervisor are a significant and growing concern. Factors include lack of dedicated security tools, an expanding attack surface targeting virtualization infrastructure, the use of data encryption by attackers, and exploitation of known vulnerabilities. Evaluating the ESXi hypervisor is critical for security, performance, and cost efficiency. This paper leverages application of artificial intelligence, specifically machine learning, to assess ransomware threats. The experimental methodology applied in this paper leverages ESXi logs to construct a sample dataset containing 5,000 labeled instances of observed attack outcomes across seven features, including vm_shutdowns, snapshot_deletions, high_entropy_files, shell_command_count, failed_login_attempts, suspicious_port_access, and data_exfil_volume. These features are used to train a model to enhance operational efficiency and maintain a robust virtualized environment.
Keywords:
References
[1] The Hacker News, Ransomware on ESXi: The Mechanism of Virtualized Attacks, https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html, [16.11.2025].
[2] Microsoft Threat Intelligence, Ransomware Operators Exploit ESXi Hypervisor Vulnerability for Mass Encryption, https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/, [09.25.2025].
[3] Cloud Flow Technologies, ESXi Hardening: A Comprehensive Security Guide for System Administrators, Cloud Flow Tech, https://cloudflowtech.com/f/esxi-hardening-a-comprehensive-security-guide-for-system-admin, [10.09.2025].
[4] Q. Zhang, L. Cheng, R. Boutaba, Cloud computing: State-of-the-art and research challenges, J. Internet Serv. Appl. 1 (2010) 7–18, https://doi.org/10.1007/s13174-010-0007-6. DOI: https://doi.org/10.1007/s13174-010-0007-6
[5] C.L.P. Chen, C.-Y. Zhang, Big Data: Survey, Technologies, Opportunities, and Challenges, Information Sciences 275 (2014) 314–347, https://doi.org/10.1016/j.ins.2014.01.015. DOI: https://doi.org/10.1016/j.ins.2014.01.015
[6] P. Russom, TDWI Best Practices Report, Big Data Analytics, https://tdwi.org/research/2011/09/best-practices-report-q4-big-data-analytics.aspx, [10.11.2025].
[7] V. Kumar, D. Sinha, A.K. Das, S.C. Pandey, R.T. Goswami, An integrated rule-based intrusion detection system: Analysis on UNSW-NB15 data set and the real time online dataset, Cluster Computing 23 (2020) 1397–1418, https://link.springer.com/article/10.1007/s10586-019-03008-x. DOI: https://doi.org/10.1007/s10586-019-03008-x
[8] A. St-Aubin, Introduction to Supervised Machine Learning,https://www.math.mcgill.ca/gsams/drp/papers/papers2024/Alexandre-St-Aubin.pdf, [10.11.2025].
[9] S. Mishra, Unsupervised Learning and Data Clustering Explained, https://towardsdatascience.com/unsupervised-learning-and-data-clustering-eeecb78b422a/, [09.25.2025].
[10] K. Murphy, Reinforcement Learning: An Overview, arXiv preprint arXiv:2412.05265 (2024), https://arxiv.org/abs/2412.05265.
[11] S. Wasoye, M. Stevens, C. Morgan, D. Hughes, J. Walker, Ransomware classification using BTLS algorithm and machine learning approaches, https://www.researchsquare.com/article/rs-5131919/v1, [10.11.2025]. DOI: https://doi.org/10.21203/rs.3.rs-5131919/v1
[12] K. Schmaltz, S. Thompson, D. Mendes, J. Carvalho, Robust defense mechanisms against adversarial ransomware attacks: Implementing a universal network-level detection filter, https://www.researchsquare.com/article/rs-5123680/v1, [10.11.2025]. DOI: https://doi.org/10.21203/rs.3.rs-5123680/v1
[13] V. Miranem, G. Petrescu, D. Schelling, and A. Vasiliev, Ransomware detection on Windows systems using file system activities and a hybrid machine learning approach, https://files.osf.io/v1/resources/27neh/providers/osfstorage/670c4c13fcb08c88b8b9392e?action=download&direct&version=1, [10.11.2025].
Article Details
Abstract views: 5

