2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) 2017
DOI: 10.1109/spac.2017.8304335
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware detection based on V-detector negative selection algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…• The read and write frequency is commonly used by these tools to detect the malware [29], [30]. Every ransomware must read and write the files to encrypt them, which they can do slowly to avoid being detected by these tools.…”
Section: History and Classification Of Ransomwarementioning
confidence: 99%
See 1 more Smart Citation
“…• The read and write frequency is commonly used by these tools to detect the malware [29], [30]. Every ransomware must read and write the files to encrypt them, which they can do slowly to avoid being detected by these tools.…”
Section: History and Classification Of Ransomwarementioning
confidence: 99%
“…We do not offer this information yet; however, only four tools base their detection exclusively on these parameters. Most tools that analyse system function calls or the cryptographic primitives combine them with other parameters, like file extensions [5], I/O operations [7], [30], [37], and data access information [48].…”
Section: Possible Uses For the Data In The Repositorymentioning
confidence: 99%
“…Furthermore, one of the most important challenges is to provide enhanced mechanisms to predict ransomware attacks before they happens and then apply countermeasures. On one hand, there are several articles that show novel detection and prediction methods [7,13,14,18]. On the other hand, some prevention mechanisms are presented in order to established some principles and suggestions to avoid a ransomware attack or loss of information [22,23,28,30].…”
Section: Current Researchmentioning
confidence: 99%
“…Part of the current research analyzes the behavior of API calls. For example, Lu et al [18] proposed a ransomware detection method based on V-detector negative selection algorithm combined with a mutation optimizer. This proposal takes into account three main features: API function calls (crypto, processes, services), behavioral expressions (network, registers and directory operations), and memory.…”
Section: Detection and Predictionmentioning
confidence: 99%
“…There have been several proposals for the detection of ransomware [9] [10] [11]. Most of them require the malware to take destructive actions before an alarm can be raised [12], [13], which implies the loss of some files.…”
Section: Introductionmentioning
confidence: 99%