2020 IEEE Symposium Series on Computational Intelligence (SSCI) 2020
DOI: 10.1109/ssci47803.2020.9308387
|View full text |Cite
|
Sign up to set email alerts
|

AI-Powered Ransomware Detection Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Only the last two apply artificial neural networks (ANN) such as convolutional neural networks (CNN) and bi-directional long short-term memory (Bi-LSTM); the others implement supervised algorithms such as naive Bayes (NB), support vector machine (SVM), sequential minimal optimization (SMO), logistic regression (LR), decision tree (DT), random forest (RF), simple logistic (SL), decision trees (DT), K-nearest neighbor (KNN), and gradient boosting decision tree (GBDT) [ 27 , 28 , 29 , 30 ].…”
Section: Related Workmentioning
confidence: 99%
“…Only the last two apply artificial neural networks (ANN) such as convolutional neural networks (CNN) and bi-directional long short-term memory (Bi-LSTM); the others implement supervised algorithms such as naive Bayes (NB), support vector machine (SVM), sequential minimal optimization (SMO), logistic regression (LR), decision tree (DT), random forest (RF), simple logistic (SL), decision trees (DT), K-nearest neighbor (KNN), and gradient boosting decision tree (GBDT) [ 27 , 28 , 29 , 30 ].…”
Section: Related Workmentioning
confidence: 99%
“…An AI based ransomware detection framework referred as AIRaD was proposed in [103]. This tool was able to detect ransomware by combining both static and dynamic analysis.…”
Section: Ransomware Hybrid Analysis Studies Utilizing Machine Learningmentioning
confidence: 99%
“…An AI based ransomware detection framework AIRaD along with machine learning algorithms was proposed in [103]. Machine learning algorithms included in the work were SVM, LR, RF, and Adaboost with J48 and J48.…”
Section: Conventional Detection Studies Utilizing Machine Learningmentioning
confidence: 99%
“…Though this approach improved the performance of the previous one, it still fell short in handling the obfuscated binaries due to the dependency on static analysis. The shortcomings of our recent approaches motivated us to adopt the hybrid approach of ransomware analysis in [24]. We reverse engineer samples using both static and dynamic analysis techniques leveraging different AI techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This current version of our research includes the extended and enhanced work of [24] with an improvised framework, more insights and experiments, and a focus on behavioral chains. Unlike other's work, our recent approach leverages hybrid multi-level deep inspection showing the relation of three levels, its contribution to unique signatures, and behavioral chains.…”
Section: Literature Reviewmentioning
confidence: 99%