2020
DOI: 10.14569/ijacsa.2020.0110262
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Behavior Attack Construction via Graph Theory Approach

Abstract: Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware detection, malware behavior need to be prioritized and analyzed in order to recognize malware attack pattern. Although the current state-of-art solutions and frameworks used dynamic analysis approach such as machine learning that provide more impact rather than sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 29 publications
(38 reference statements)
0
5
0
Order By: Relevance
“…Such a shift has introduced a new generation of ransomware threats, which have raised considerable concerns regarding the safeguarding of information privacy and the security of organizations at large [8], [9]. The transition from reliance on encryption to strategies that emphasize exfiltration has compelled a thorough reassessment of the defensive tactics and analytical methodologies traditionally employed [10], [11]. Within this context, memory forensics has come to the forefront as a formidable instrument in the ongoing struggle against ransomware, providing researchers with the means to examine these threats within their operational environment and extract valuable insights from the behaviors they exhibit while active [6], [12].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%
See 1 more Smart Citation
“…Such a shift has introduced a new generation of ransomware threats, which have raised considerable concerns regarding the safeguarding of information privacy and the security of organizations at large [8], [9]. The transition from reliance on encryption to strategies that emphasize exfiltration has compelled a thorough reassessment of the defensive tactics and analytical methodologies traditionally employed [10], [11]. Within this context, memory forensics has come to the forefront as a formidable instrument in the ongoing struggle against ransomware, providing researchers with the means to examine these threats within their operational environment and extract valuable insights from the behaviors they exhibit while active [6], [12].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%
“…Although the outcomes of the study have been encouraging, it has concurrently illuminated the complex challenges faced when contending with sophisticated ransomware. The capacity for adaptation and the elusive nature of contemporary ransomware strains have demanded ongoing progress in the realms of detection and analytical methodologies [10], [4]. The dependence on methods such as pattern recognition and analysis of memory, while they have proved to be beneficial, might not be entirely reliable against ransomware that is continuously evolving to bypass these particular detection strategies [36].…”
Section: B Challenges In Addressing Advanced Ransomware Threatsmentioning
confidence: 99%
“…In this approach, the ransomware behaviors are analyzed and visualized in a graph-based pattern via Neo4j, a graph database tool. It is possible to recognize the type of ransomware and most impactful graph base node during the analysis (Rosli et al, 2020). Ding et al (2018) implemented the graphbased method to detect malware, particularly the behavior matching algorithm of the maximum weight subgraph.…”
Section: Gaming In Cyber Security Educationmentioning
confidence: 99%
“…The payment for the ransom must be made using a cryptocurrency transaction. The encrypted data cannot be decrypted unless the attacker provides the encryption key [27,28]. Two varieties of ransomware exist locker and cryptographic.…”
Section: Introductionmentioning
confidence: 99%