2022
DOI: 10.17798/bitlisfen.1038966
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Detection in Cyber Security Domain

Abstract: In recent years, ransomware has become highly profitable cyber attacks. This is because, everyday there are several new devices attending to computer networks before testing their security strength. In addition, it is easy to launch ransomware attacks by using Ransomware-as-a-Service. This paper proposed a new method that creates the ransomware specific features by using ransomware behaviors which are performed on file, registry, and network resources. The weights are assigned to the behaviors based upon where… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
2

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
1
0
2
Order By: Relevance
“…Dynamic analysis techniques have emerged as a crucial tool in the detection and analysis of ransomware, particularly those variants engaged in privacy breaches [25]- [28]. The literature outlines the effectiveness of dynamic analysis in identifying malicious activities in real-time, by monitoring system behavior and detecting anomalies that may indicate a ransomware attack [29], [30]. Those techniques often involve the execution of suspicious code in a controlled environment to observe its behavior, enabling researchers and cybersecurity professionals to identify and mitigate threats more effectively [29]- [33].…”
Section: B Dynamic Analysis Techniquesmentioning
confidence: 99%
“…Dynamic analysis techniques have emerged as a crucial tool in the detection and analysis of ransomware, particularly those variants engaged in privacy breaches [25]- [28]. The literature outlines the effectiveness of dynamic analysis in identifying malicious activities in real-time, by monitoring system behavior and detecting anomalies that may indicate a ransomware attack [29], [30]. Those techniques often involve the execution of suspicious code in a controlled environment to observe its behavior, enabling researchers and cybersecurity professionals to identify and mitigate threats more effectively [29]- [33].…”
Section: B Dynamic Analysis Techniquesmentioning
confidence: 99%
“…Önerilen yöntemin doğrulanması amacıyla kullanılan görüntüler, Amerika Birleşik Devletleri'nde Ulusal Sağlık Enstitüleri (NIH) tarafından sağlanan açık erişimli bir veri kümesinden temin edilmiştir. Bu veri kümesi, toplamda 27.558 hücre görüntüsü içermekte olup, parazitli ve parazitsiz hücrelerin eşit örneklerini içermektedir [13]. Tüm görseller, Mahidol-Oxford Tropikal Tıp Araştırma Birimi'nde bir uzman tarafından açıklanmıştır.…”
Section: şEkil 1 öNerilen Sistemin Blok Diyagramıunclassified
“…ML ve DL teknikleri tıbbi görüntü kategorizasyonunda yaygın olarak kullanılmaktadır. Tıbbi cihazlar DL yöntemlerini benimsemeye başlamıştır [13,14]. Kan hücrelerindeki sıtma parazitleri mikroskop görüntüleri ve benzer DL yöntemleri kullanılarak tespit edilmektedir.…”
Section: Introductionunclassified