2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) 2016
DOI: 10.1109/iscisc.2016.7736455
|View full text |Cite
|
Sign up to set email alerts
|

2entFOX: A framework for high survivable ransomwares detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(23 citation statements)
references
References 3 publications
0
23
0
Order By: Relevance
“…Monitoring network events may reveal connections to Command & Control Servers, intercepted network packets could leak information such as encryption keys, and logs could reveal behaviour that is different to baseline activity. As an example, [29] and [13] detect ransomware that uses domain generation algorithms (DGAs) by monitoring DNS traffic to apply Markov Chains and behavioural-based detection features.…”
Section: Detectionmentioning
confidence: 99%
“…Monitoring network events may reveal connections to Command & Control Servers, intercepted network packets could leak information such as encryption keys, and logs could reveal behaviour that is different to baseline activity. As an example, [29] and [13] detect ransomware that uses domain generation algorithms (DGAs) by monitoring DNS traffic to apply Markov Chains and behavioural-based detection features.…”
Section: Detectionmentioning
confidence: 99%
“…Most ransomwares detection solutions are relying on filesystem [35]- [37] and registry events [38] to identify malicious behaviors. Investigation of 1359 ransomware samples showed that majority of ransomware samples are using similar APIs and generating similar logs of filesystem activities [36].…”
Section: Related Workmentioning
confidence: 99%
“…Investigation of 1359 ransomware samples showed that majority of ransomware samples are using similar APIs and generating similar logs of filesystem activities [36]. For example, using 20 types of filesystem and registry events as features of a Bayesian Network model against 20 Windows ransomware samples resulted to an accurate ransomware detection with F-Measure of 0.93 [38]. UNVEIL [36] as a rasnsomware classification system utilized filesystem events to distinguish 13,637 ransomwares from a dataset of 148,223 malware samples with accuracy of 96.3%.…”
Section: Related Workmentioning
confidence: 99%
“…It focuses on the observation of three elements, namely, I/O data buffer entropy, access patterns and file system activities [1]. Moreover, some others are type-specific solutions that deal with only one type, such as cryptoransomware [21][22][23][24][25]. For example, Scaife presented an earlywarning detection system that alerts users during suspicious file activities [21].…”
Section: Background and Related Workmentioning
confidence: 99%