2022
DOI: 10.1109/access.2021.3128024
|View full text |Cite
|
Sign up to set email alerts
|

Dual Generative Adversarial Networks Based Unknown Encryption Ransomware Attack Detection

Abstract: Aiming at unknown or variant ransomware attack encrypted with SSL (Secure Sockets Layer)/ TLS (Transport Layer Security) protocol, a detection framework named TGAN-IDS (Transferred Generating Adversarial Network-Intrusion Detection System) based on dual generative adversarial networks is presented in this paper. In this framework, DCGAN (Deep Convolutional Generative Adversarial Network) is adopted to train a generator which has good performance to generate adversarial sample, and is transferred to the generat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…This initiative provides free decryption tools and supplementary sources of information to ransomware victims to decrypt their files without having to pay a ransom to cybercriminals [28]. The NMR project website hosted at nomoreransom.org is currently sustained by 188 partners worldwide and provides over 100 decryptors that assist victims with 165 different types of ransomware variants to restore their encrypted data and recover their files [29,30]. The Crypto Sheriff tool is available on the NMR website and is intended to help victims of ransomware discover a free decryptor.…”
Section: Discussionmentioning
confidence: 99%
“…This initiative provides free decryption tools and supplementary sources of information to ransomware victims to decrypt their files without having to pay a ransom to cybercriminals [28]. The NMR project website hosted at nomoreransom.org is currently sustained by 188 partners worldwide and provides over 100 decryptors that assist victims with 165 different types of ransomware variants to restore their encrypted data and recover their files [29,30]. The Crypto Sheriff tool is available on the NMR website and is intended to help victims of ransomware discover a free decryptor.…”
Section: Discussionmentioning
confidence: 99%
“…A different strategy involves detecting ransomware activity before or during transmission before its payload runs on the host. Numerous authors have effectively showcased the success of this approach [74]- [79]. Liu and Patras [74] identify ransomware while it seeks new victims on the network via Server Message Block (SMB) protocol requests on port 445.…”
Section: ) Detection During Deliverymentioning
confidence: 99%
“…GANs are designed to generate new data instances resembling a given dataset, proving highly valuable in adversarial learning tasks, such as creating scenarios for zero-day attacks where relevant data may be scarce. Several studies in the literature have employed GANs to generate synthetic datasets [79], [118], augmenting real attack patterns due to the evolving nature of ransomware and the custom tactics involved in zero-day attacks. However, despite the recent emphasis on deep learning techniques, it's noteworthy that these approaches tend to be resource-intensive and time-consuming.…”
Section: B: Deep Learning Techniquesmentioning
confidence: 99%
“…The authors showed that their approach can be an effective tool for detecting infection in organizational virtual machines. Zhang et al [31] built a model called PreD for binary classification based on Convolutional Neural Networks. In order to improve the performance of their model, a transfer learning mechanism was employed.…”
Section: C: Other Platformsmentioning
confidence: 99%