2023
DOI: 10.3390/fi15100318
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction

Mazen Gazzan,
Frederick T. Sheldon

Abstract: Recent ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly outdated attack patterns, despite efforts to focus on select features. Such an approach assumes that the same features remain unchanged. This approach proves ineffective due to the polymorphic and metamorphic characteristics of ransomware, which generate unique a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Additionally, the dissection of ransom messages, which are crafted to coerce or psychologically manipulate victims into complying with the ransom demands, forms an integral part of understanding the ransomware's modus operandi [59], [34]. Such comprehensive exploration of ransomware features, from its technical execution to its economic and psychological impact, sheds light on the multifaceted nature of these cyber threats, thus providing a more holistic view of the ransomware landscape and its implications for both individuals and organizations [60], [16].…”
Section: B Exploration Of Ransomware Featuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, the dissection of ransom messages, which are crafted to coerce or psychologically manipulate victims into complying with the ransom demands, forms an integral part of understanding the ransomware's modus operandi [59], [34]. Such comprehensive exploration of ransomware features, from its technical execution to its economic and psychological impact, sheds light on the multifaceted nature of these cyber threats, thus providing a more holistic view of the ransomware landscape and its implications for both individuals and organizations [60], [16].…”
Section: B Exploration Of Ransomware Featuresmentioning
confidence: 99%
“…The advent of LLMs in cybersecurity, offering a blend of artificial intelligence and natural language processing capabilities, presents a novel solution in this battle against ransomware [13], [14], [15]. These models are not only capable of understanding complex language constructs but can also simulate negotiation tactics that were traditionally the realm of human experts [16], [17]. This ability to simulate human-like negotiation strategies could be instrumental in mitigating the fallout from ransomware attacks, particularly in situations where communication with the attackers is inevitable [18], [19], [20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Among these risks are the malware attacks utilized by attackers to steal data, disrupt operations, or hijack systems causing operational interruptions as well as impacts affecting reputation and compliance [2]. Ransomware is one type of malware that attackers use to lock user data using the operating system's own cryptographic utilities [3,4]. Ransomware presents a significant threat to organizations and individuals, as it encrypts files rendering computer systems inoperable.…”
Section: Introductionmentioning
confidence: 99%
“…The substantial impact of such attacks is evident from the global damages inflicted on various systems around the world [5][6][7][8]. Given the complexity of ransomware, showcased by variants like LockBit 2.0, it is clear that advanced preventative and remediation strategies are needed [9,10]. Research is being directed toward developing detection systems that leverage behavioral, network traffic, and machine learning techniques for real-time detection and categorization of ransomware threats [11][12][13].…”
Section: Introductionmentioning
confidence: 99%