2018 IEEE International Conference on Intelligence and Security Informatics (ISI) 2018
DOI: 10.1109/isi.2018.8587409
|View full text |Cite
|
Sign up to set email alerts
|

Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Although these indicators proved useful for analysing the behaviour of particular malware variants, they failed to generate IOCs associated with ICSs. Likewise, Verma et al [148] applied ML techniques to detect ransomware behaviours in the Cuckoo sandbox. The study focused on IOCs, which are used to set the base for analysing and classifying new ransomware based on their behaviour.…”
Section: Machine Learning and Deep Learning Techniquesmentioning
confidence: 99%
“…Although these indicators proved useful for analysing the behaviour of particular malware variants, they failed to generate IOCs associated with ICSs. Likewise, Verma et al [148] applied ML techniques to detect ransomware behaviours in the Cuckoo sandbox. The study focused on IOCs, which are used to set the base for analysing and classifying new ransomware based on their behaviour.…”
Section: Machine Learning and Deep Learning Techniquesmentioning
confidence: 99%
“…They have utilized behavior logs from analysis reports created by Cuckoo sandbox under several situations of ordinary and malware interactions. likewise, Verma et al [27] focused on the indicators of compromises (IOCs) for ransomware using Cuckoo sandbox. Which will be used to set the base for analyzing and classifying new ransomware based on their behavior.…”
Section: Categorizing Ransomware Characteristicsmentioning
confidence: 99%
“…Verma et al [27], 2018 Implemented an automated system using supervised machine learning classifiers to classify the ransomware samples.…”
mentioning
confidence: 99%
“…A turning point in this process is the use of Indicators of Compromise (IOCs) that support the security decision-making process [21]. IOCs include malware signature IDs, malicious IP addresses, malicious checksum (MD5) malware, and malicious URLs or domain names of Botnets, as well as patch fixes, good practices in control measures, access control policies or removing unnecessary services, and modifying firewall settings [22] [23] [24]. In other words, this is a huge repository of knowledge with proven defense techniques, which are strengthened daily by adding updates.…”
Section: Introductionmentioning
confidence: 99%