2022
DOI: 10.1016/j.eswa.2022.118299
|View full text |Cite
|
Sign up to set email alerts
|

Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 53 publications
0
20
0
Order By: Relevance
“…Using Bi-ALSTM, the authors detect attack patterns before the network is compromised, achieving an impressive 99.97% detection rate. Berrueta et al [75] employ a similar strategy, monitoring the communication between clients and file servers using a network probe. This probe captures and analyses file-sharing traffic, including SMB and NFS traffic.…”
Section: ) Detection During Deliverymentioning
confidence: 99%
“…Using Bi-ALSTM, the authors detect attack patterns before the network is compromised, achieving an impressive 99.97% detection rate. Berrueta et al [75] employ a similar strategy, monitoring the communication between clients and file servers using a network probe. This probe captures and analyses file-sharing traffic, including SMB and NFS traffic.…”
Section: ) Detection During Deliverymentioning
confidence: 99%
“…There were two test systems used, one with a relatively low amount of sensor data accessible and the other with a comparatively significant amount. Berrueta et al [79] introduced a detection approach based on file-sharing traffic analysis that can detect and stop the crypto-ransomware activity. The latter uses machine learning techniques to monitor traffic between clients and file servers.…”
Section: C: Other Platformsmentioning
confidence: 99%
“…The dense and disordered nature of these ✻✵ traces often leads to a surge in computational overhead and a consequent depletion in the ✻✶ ability to accurately pinpoint and characterize malevolent activities [14,22]. This increase ✻✷ in resource consumption coupled with the challenge of accurately discerning the malicious ✻✸ from the benign has driven researchers and cybersecurity professionals to seek out more ✻✹ advanced and nuanced methods of detection and analysis [15,23,24]. As ransomware ✻✺ evolves, so too must the tools and techniques employed to detect it, underscoring the need ✻✻ for continuous innovation in the realm of cybersecurity [25,26].…”
Section: ✹✼mentioning
confidence: 99%