2023
DOI: 10.14569/ijacsa.2023.0140952
|View full text |Cite
|
Sign up to set email alerts
|

Unraveling Ransomware: Detecting Threats with Advanced Machine Learning Algorithms

Karam Hammadeh,
M. Kavitha

Abstract: In our contemporary world, the pervasive influence of information technology, computer engineering, and the Internet has undeniably catalyzed innovation, fostering unparalleled economic growth and revolutionizing education. This technological juggernaut, however, has unwittingly ushered in a parallel era of new criminal frontiers, a magnet for hackers and cybercriminals. These malevolent actors exploit the vast expanse of electronic devices and interconnected networks to perpetrate an array of cybercrimes, and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…Privacy-breaching ransomware is characterized by its focus on data theft, distinguishing it from traditional ransomware that primarily seeks to encrypt data for ransom. The literature reveals that this variant poses a more insidious threat, as it not only disrupts operations but also compromises data confidentiality [12]- [16]. Such ransomware typically employs techniques to identify and exfiltrate data of value, often targeting specific file types or databases containing sensitive personal or corporate information [1], [17], [18].…”
Section: A Privacy-breaching Ransomwarementioning
confidence: 99%
“…Privacy-breaching ransomware is characterized by its focus on data theft, distinguishing it from traditional ransomware that primarily seeks to encrypt data for ransom. The literature reveals that this variant poses a more insidious threat, as it not only disrupts operations but also compromises data confidentiality [12]- [16]. Such ransomware typically employs techniques to identify and exfiltrate data of value, often targeting specific file types or databases containing sensitive personal or corporate information [1], [17], [18].…”
Section: A Privacy-breaching Ransomwarementioning
confidence: 99%