2016
DOI: 10.1007/s11227-016-1825-5
|View full text |Cite
|
Sign up to set email alerts
|

CloudRPS: a cloud analysis based enhanced ransomware prevention system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(23 citation statements)
references
References 18 publications
0
22
0
1
Order By: Relevance
“…Not only a different operating system or device, ransomware can affect online storage along with offline or IoT devices along with simple computing devices also. However, ransomware detection techniques have also been proposed for the same [28,29]. Although most of the techniques developed to detect a particular type of ransomware were found to have good accuracy, a full-fledged technique has not been developed yet to detect all ransomware because of frequent updation of ransomware signature.…”
Section: Machine-learning Based Approachmentioning
confidence: 99%
“…Not only a different operating system or device, ransomware can affect online storage along with offline or IoT devices along with simple computing devices also. However, ransomware detection techniques have also been proposed for the same [28,29]. Although most of the techniques developed to detect a particular type of ransomware were found to have good accuracy, a full-fledged technique has not been developed yet to detect all ransomware because of frequent updation of ransomware signature.…”
Section: Machine-learning Based Approachmentioning
confidence: 99%
“…Many researchers (Andronio et al 2015;Lee et al 2016;Kharraz et al 2016;Sgandurra et al 2016;Zscaler 2016) agree that crypto-ransomware's typical behaviour involves the manipulation of files and displaying a threatening message, which can be identified through the ransomware's use of Windows API function calls. It is possible to monitor read, encrypt, and delete operations called at the user-level, which are then passed onto the kernel to the input/output (I/O) scheduler (Kharraz et al 2016).…”
Section: Related Workmentioning
confidence: 99%
“…Cuckoo Sandbox allows the submission of Dynamic Linked Libraries (DDLs), Java files, binary executables, URLs, MS Office documents, and PDFs as samples (Ferrand 2015). Several researchers have developed analysis systems for the detection and classification of ransomware threats including Unveil (Kharraz et al 2016), HelDroid (Andronio et al 2015), EldeRan (Sgandurra et al 2016), and CloudRPS (Lee et al 2016). Kharraz et al (2016) developed a ransomware detection and classification system called Unveil that identifies ransomware based on its behavioural constructs.…”
Section: Tools and Strategies For Analysing Ransomwarementioning
confidence: 99%
See 1 more Smart Citation
“…Recently, and in parallel with the development of local-level solutions, the research community studied the impact of the cryptoransomware on communication processes. This prompted the publication of the first proposals based on analyzing network features in emerging scenarios, as is the case of [10,58] at Internet of Things (IoT) or [42] at Cloud Computing. As indicated by Cabaj et al [8], the list of IP addresses with which each ransomware specimen tries to communicate with C&C server tends to be similar with those of previous detected threats.…”
Section: Countermeasuresmentioning
confidence: 99%