2020
DOI: 10.1016/j.jnca.2020.102753
|View full text |Cite
|
Sign up to set email alerts
|

A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
74
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 87 publications
(74 citation statements)
references
References 20 publications
0
74
0
Order By: Relevance
“…Via API Call Behavior: One of the main behavioral features obtained from dynamic analysis of ransomware is API calls. In this context, the works [8,15,17,34,49,122,166,182,203] used API calls as features to build ML classiiers to detect ransomware in PCs/workstations. Some of the studies used API calls as features and built SVM classiiers [182], Long-Short Term Memory (LSTM) classiiers [122], Recurrent Neural Network (RNN) classiiers [7], and Restricted Boltzmann Machine classiiers [166].…”
Section: Ransomware Detection For Pcs/worktationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Via API Call Behavior: One of the main behavioral features obtained from dynamic analysis of ransomware is API calls. In this context, the works [8,15,17,34,49,122,166,182,203] used API calls as features to build ML classiiers to detect ransomware in PCs/workstations. Some of the studies used API calls as features and built SVM classiiers [182], Long-Short Term Memory (LSTM) classiiers [122], Recurrent Neural Network (RNN) classiiers [7], and Restricted Boltzmann Machine classiiers [166].…”
Section: Ransomware Detection For Pcs/worktationsmentioning
confidence: 99%
“…In addition to the reviewed studies building various classiiers using API calls, some researchers focused more on inding the most signiicant API call features. Ahmed et al [8] proposed a new iltering method in the feature selection process to ind the most appropriate API call n-grams for ransomware detection. They tested the performance of various ML classiiers.…”
Section: Ransomware Detection For Pcs/worktationsmentioning
confidence: 99%
“…Data-centric identification aims to track the sources being affected rather than the malicious operation causing the attack [19]. Data-centric crypto ransomware identification techniques [4][5][6][7][8][9] have been explored in several studies. To identify anomalous modifications, most of these solutions offered rely on analyzing user-related documents on a continual basis.…”
Section: Data Centric-based Approachesmentioning
confidence: 99%
“…The efforts of security professionals and researches have converged to fight ransomware attacks [5,6]. They work side-by-side to detect, prevent, and mitigate such attacks and their potential effect.…”
Section: Introductionmentioning
confidence: 99%
“…These methods change the binary of the malware, and thus its hash, but leave its behavior unmodified. Behavioralbased malware detection has been extensively studied in the literature [13,15]. Machine learning techniques were used to train a model based on features collected from dynamic analysis.…”
Section: Introductionmentioning
confidence: 99%