2021
DOI: 10.5755/j01.itc.50.3.25816
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm

Abstract: Ransomware is a malware that represents a serious threat to a user’s information privacy. By investigating howransomware works, we may be able to recognise its atomic behaviour. In return, we will be able to detect theransomware at an earlier stage with better accuracy. In this paper, we propose Control Flow Graph (CFG) asan extracting opcode behaviour technique, combined with 4-gram (sequence of 4 “words”) to extract opcodesequence to be incorporated into Trojan Ransomware detection method using K-Nearest Nei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Advancements in heuristic analysis have also been a key development in this field [39], [12]. Heuristic analysis involves examining the characteristics of a file or program to determine if it behaves like ransomware, even if it does not match a known signature [32], [47], [17]. This method allows for the detection of ransomware that has been deliberately obfuscated or altered to evade signature-based systems [48], [49].…”
Section: A Ransomware Detection Methodologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Advancements in heuristic analysis have also been a key development in this field [39], [12]. Heuristic analysis involves examining the characteristics of a file or program to determine if it behaves like ransomware, even if it does not match a known signature [32], [47], [17]. This method allows for the detection of ransomware that has been deliberately obfuscated or altered to evade signature-based systems [48], [49].…”
Section: A Ransomware Detection Methodologiesmentioning
confidence: 99%
“…The advent of LLMs in cybersecurity, offering a blend of artificial intelligence and natural language processing capabilities, presents a novel solution in this battle against ransomware [13], [14], [15]. These models are not only capable of understanding complex language constructs but can also simulate negotiation tactics that were traditionally the realm of human experts [16], [17]. This ability to simulate human-like negotiation strategies could be instrumental in mitigating the fallout from ransomware attacks, particularly in situations where communication with the attackers is inevitable [18], [19], [20].…”
Section: Introductionmentioning
confidence: 99%
“…The domain of memory forensics has ascended in its pertinence, enabling detailed examination of ransomware within its active context, thus permitting the extraction of critical insights about its execution behavior [21], [22]. However, contemporary ransomware's ingenuity poses a consistent challenge to a spectrum of advanced research methodologies developed for ransomware mitigation [19], [16], [23]. Such methods encompass behavior-based detection, which scrutinizes system activities for abnormalities; anomaly detection systems that leverage statistical models to identify outliers in data patterns; signature-based filtering, which relies on known data patterns to detect ransomware; heuristic analysis, using experience-based techniques for identifying suspicious behavior; dynamic analysis in secure sandbox environments that isolate the ransomware to observe its behavior without risk to real systems; and comprehensive endpoint detection and response solutions that monitor end-user devices for indicators of compromise [24], [25].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%
“…The domain of memory forensics has ascended in its pertinence, enabling detailed examination of ransomware within its active context, thus permitting the extraction of critical insights about its execution behavior [21], [22]. However, contemporary ransomware's ingenuity poses a consistent challenge to a spectrum of advanced research methodologies developed for ransomware mitigation [19], [16], [23]. Such methods encompass behavior-based detection, which scrutinizes system activities for abnormalities; anomaly detection systems that leverage statistical models to identify outliers in data patterns; signature-based filtering, which relies on known data patterns to detect ransomware; heuristic analysis, using experience-based techniques for identifying suspicious behavior; dynamic analysis in secure sandbox environments that isolate the ransomware to observe its behavior without risk to real systems; and comprehensive endpoint detection and response solutions that monitor end-user devices for indicators of compromise [24], [25].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%