2021 18th International Conference on Privacy, Security and Trust (PST) 2021
DOI: 10.1109/pst52912.2021.9647816
|View full text |Cite
|
Sign up to set email alerts
|

API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…AI/ML algorithms have also been successful in detecting threats and ransomware detection [43]. AI/ML algorithms have shown promising performance on the classification task of the ransomware samples [44], and deep learning architectures have been employed to detect Trojan attacks on encrypted DNA data. The supply chain is also a crucial sector of the biotechnology Industry 5.0 and directly affects every aspect of the bioeconomy [45], from transportation to industrial machinery in labs.…”
Section: The Role Of Mlsecops In the Biotechnology Industry 50mentioning
confidence: 99%
“…AI/ML algorithms have also been successful in detecting threats and ransomware detection [43]. AI/ML algorithms have shown promising performance on the classification task of the ransomware samples [44], and deep learning architectures have been employed to detect Trojan attacks on encrypted DNA data. The supply chain is also a crucial sector of the biotechnology Industry 5.0 and directly affects every aspect of the bioeconomy [45], from transportation to industrial machinery in labs.…”
Section: The Role Of Mlsecops In the Biotechnology Industry 50mentioning
confidence: 99%
“…They showed that their approach is effective with high accuracy and a low false-positive rate. Almousa et al [77] designed a new approach for ransomware detection based on Application Programming Interface and Machine Learning. Their study used dynamic analysis on the Windows platform and sandbox analysis for sampling.…”
Section: A: Desktop Platformsmentioning
confidence: 99%
“…Initially, investigations into this domain have highlighted the shortcomings in traditional machine learning methodologies when applied to the analysis of PE files [18,12]. Often, these limitations stem from the selection of inadequate features, which fail to capture the nuanced characteristics of ransomware [13,34]. Following this, a significant amount of research has delved into the extraction and comprehensive analysis of metadata derived from PE files [5,1].…”
Section: Portable Executable Files In Ransomware Analysismentioning
confidence: 99%