2023
DOI: 10.1109/tnse.2022.3188597
|View full text |Cite
|
Sign up to set email alerts
|

RThreatDroid: A Ransomware Detection Approach to Secure IoT Based Healthcare Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 33 publications
0
17
0
Order By: Relevance
“…We implemented and tested these decoys against multiple sophisticated ransomware samples, managing to detect illegal data staging and prevent exfiltration in nearly all cases during our trials [24]. With average ransomware payments now exceeding $540,000, adopting advanced deception technology is no longer an option but an urgent necessity for organizations seeking to secure their most confidential data [25]. Our results demonstrate that all are at risk, from Fortune 500 giants to municipal bodies [31].…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…We implemented and tested these decoys against multiple sophisticated ransomware samples, managing to detect illegal data staging and prevent exfiltration in nearly all cases during our trials [24]. With average ransomware payments now exceeding $540,000, adopting advanced deception technology is no longer an option but an urgent necessity for organizations seeking to secure their most confidential data [25]. Our results demonstrate that all are at risk, from Fortune 500 giants to municipal bodies [31].…”
Section: Introductionmentioning
confidence: 98%
“…Decoy files planted across networks can act as traps to detect abnormal access attempts and raise early alarms [23]. However, contemporary ransomware variants conduct ex-tensive reconnaissance and often ignore decoys when seeking valuable data [4,24,25]. Moreover, they exfiltrate data before triggering encryption, leaving little window for response once decoys detect anomalies [26].…”
Section: Introductionmentioning
confidence: 99%
“…By utilizing past data gatheblack for a particular activity to automatically optimize performance without iteration, ML may be utilized to enhance the performance of various IoT devices. [15][16][17][18][19][20][21] Specifically, the following points are the primary reasons why ML is significant in IoT applications: • The configurations that IoT systems frequently screen have a dynamic structure. As a result, it is critical to develop IoT systems that can effectively respond to these changes as a whole.…”
Section: Iotmentioning
confidence: 99%
“…The IoT enables the connection of millions of objects, including sensors and mobile phones/devices, to carry out numerous functions. By utilizing past data gatheblack for a particular activity to automatically optimize performance without iteration, ML may be utilized to enhance the performance of various IoT devices 15–21 . Specifically, the following points are the primary reasons why ML is significant in IoT applications: The configurations that IoT systems frequently screen have a dynamic structure.…”
Section: Introductionmentioning
confidence: 99%
“…This process has been fundamental in dissecting the lifecycle of a ransomware attack, from the initial infection vectors to the execution of the payload [6,20,16]. Researchers employing reverse engineering have made notable progress in understanding how ransomware evolves, adapts, and circumvents traditional cybersecurity measures [25,26]. This method has also been instrumental in revealing the multi-stage nature of modern ransomware attacks, which often involve complex processes like key generation and communication with command and control servers [11,29].…”
Section: Ransomware Static Analysismentioning
confidence: 99%