2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2019
DOI: 10.1109/ntms.2019.8763851
|View full text |Cite
|
Sign up to set email alerts
|

Combating Ransomware using Content Analysis and Complex File Events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…These algorithms are trained on vast datasets to accurately distinguish between normal operations and potential ransomware threats [17], [24], [25]. In addition to machine learning, heuristic analysis has been pivotal in this area [26], [27]. This method hinges on monitoring distinctive ransomware traits, such as the rapidity of file encryption, which serves as a telltale sign of such an attack [28], [19].…”
Section: A Ransomware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…These algorithms are trained on vast datasets to accurately distinguish between normal operations and potential ransomware threats [17], [24], [25]. In addition to machine learning, heuristic analysis has been pivotal in this area [26], [27]. This method hinges on monitoring distinctive ransomware traits, such as the rapidity of file encryption, which serves as a telltale sign of such an attack [28], [19].…”
Section: A Ransomware Detectionmentioning
confidence: 99%
“…Technically, the development of endpoint security solutions, which integrate state-of-the-art threat prevention capabilities, play an instrumental role in thwarting the execution of ransomware attacks [9], [20], [36]. These solutions are adept at identifying and neutralizing potential threats before they can inflict damage [5], [10], [27]. Email filtering technologies have also been a cornerstone in these preventive measures, effectively screening for phishing attempts, which are frequently employed as a conduit for ransomware delivery [37], [22].…”
Section: B Ransomware Preventionmentioning
confidence: 99%
“…Features extraction is one of the most important aspects in Machine Learning. As we mentioned above, Kyungroul Lee et al [7] proposed an Entropy Based Detection Method (EBDM for short) which is one useful method of evaluating the performance of cipher text generated from cryptography. They used three different types of entropy measures: Shannon entropy (1), the most common entropy (2), Ré nyi entropy with α = 2 (collision entropy) (3) and compression estimate.…”
Section: B Features Extractionmentioning
confidence: 99%
“…[6] explain on recovering the original file from the backup system by detecting ransomware infected files. Content analysis by using complex events and consider the file lifecycle for combating ransomware is discussed [7].This paper starts from the observation of the status of the file itself and uses a variety of different formats of normal files and infected files. The files infected by the ransomware are mixed as a data set, and the machine learning model is trained through SVM to detect whether the files are maliciously encrypted so that the system has sufficient time to back up or block the service, and remediate the user's files to minimize the damage.…”
Section: Introductionmentioning
confidence: 99%
“…May and Laron 12 proposed two techniques to combact ransomware by monitoring suspicious modifications on files. They considered two techniques for it, one is file lifecycle and another is use of content analysis.…”
Section: Host-basedmentioning
confidence: 99%