2022
DOI: 10.1007/s13198-022-01793-0
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The severity of the attack is classified according to the degree of damage to the target network environment according to the attack intent, from 0 to 9 divided into ten levels, the higher the level, the higher the severity of the consequences of the attack [9]. The classification is mainly based on the destructiveness of the attack and the purpose and means of the invasion.…”
Section: Attack Severity Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…The severity of the attack is classified according to the degree of damage to the target network environment according to the attack intent, from 0 to 9 divided into ten levels, the higher the level, the higher the severity of the consequences of the attack [9]. The classification is mainly based on the destructiveness of the attack and the purpose and means of the invasion.…”
Section: Attack Severity Classificationmentioning
confidence: 99%
“…Implementing effective cybersecurity measures can be costly and time-consuming, and smaller organizations may not have the resources to invest in such measures. Using information technology to evaluate and prevent cyber threats in a hierarchical manner can help organizations make better use of their limited resources by identifying the areas of greatest risk and focusing their efforts on those areas [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The core motivation behind NTFS+ is to integrate advanced security measures directly into the file system [20], [19]. These could include anomaly detection algorithms to monitor and flag unusual file encryption activities, integrated backup solutions for quick recovery, and more robust access controls to prevent unauthorized changes [7], [17]. The development of NTFS+ aims not only to defend against current ransomware methodologies but also to establish a foundation that can adapt to and counter future evolutions in ransomware tactics.…”
Section: B Ntfsmentioning
confidence: 99%
“…A prominent strategy in this field has been the deployment of machine learning algorithms, which scrutinize file access patterns to pinpoint irregular encryption activities that are typically indicative of ransomware infiltration [5], [23], [8]. These algorithms are trained on vast datasets to accurately distinguish between normal operations and potential ransomware threats [17], [24], [25]. In addition to machine learning, heuristic analysis has been pivotal in this area [26], [27].…”
Section: A Ransomware Detectionmentioning
confidence: 99%