2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020
DOI: 10.1109/ccwc47524.2020.9031182
|View full text |Cite
|
Sign up to set email alerts
|

A proposed Crypto-Ransomware Early Detection(CRED) Model using an Integrated Deep Learning and Vector Space Model Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(27 citation statements)
references
References 22 publications
0
27
0
Order By: Relevance
“…This is the case of [38], where an ensemble-based detection model which incorporates two techniques (incremental bagging and enhanced semi-random subspace selection) is evaluated for ransomware detection. In [39,40], deep learning techniques are explored. In the first case, to extract the latent representation of a high dimension of collected data to identify malicious behaviours accurately.…”
Section: Related Workmentioning
confidence: 99%
“…This is the case of [38], where an ensemble-based detection model which incorporates two techniques (incremental bagging and enhanced semi-random subspace selection) is evaluated for ransomware detection. In [39,40], deep learning techniques are explored. In the first case, to extract the latent representation of a high dimension of collected data to identify malicious behaviours accurately.…”
Section: Related Workmentioning
confidence: 99%
“…The experimental results showed a convergence performance of about 50%. CRED [13] used a process-and data-driven approach to detect cryptography algorithms. CRED built an early detection model using both data-and process-driven approaches based on the LSTM algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…This allowed the ransomware to be identified before it started an encryption attack. As a result, the model proposed in [13] effectively protected personal and business data. RWguard [14] studied ransomware detection and experimented on samples from 14 widely known ransomware families.…”
Section: Introductionmentioning
confidence: 99%
“…In these methods, a truncated API call sequence that focuses on the pre-encryption behavior of the ransomware is collected. The truncation length is either static for all samples based upon analysis duration or the number of steps [104,210,223], or dynamic based upon the occurrence of the first cryptographic API call [13,18,6]. A static length is limited because it assumes that all the ransomware variants start encryption at a specific time.…”
Section: Problem Statementmentioning
confidence: 99%
“…A static length is limited because it assumes that all the ransomware variants start encryption at a specific time. A dynamic length is also limited in that the first cryptographic API call may be related to the unpacking of binary hence misleading [18]. Such limitations need to be addressed for a concrete ransomware early detection solution.…”
Section: Problem Statementmentioning
confidence: 99%