2020
DOI: 10.1109/access.2020.3012674
|View full text |Cite
|
Sign up to set email alerts
|

A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction

Abstract: The cryptography employed against user files makes the effect of crypto-ransomware attacks irreversible even after detection and removal. Thus, detecting such attacks early, i.e. during pre-encryption phase before the encryption takes place is necessary. Existing crypto-ransomware early detection solutions use a fixed time-based thresholding approach to determine the pre-encryption phase boundaries. However, the fixed time thresholding approach implies that all samples start the encryption at the same time. Su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 51 publications
(73 citation statements)
references
References 45 publications
(64 reference statements)
0
73
0
Order By: Relevance
“…(2018) ; Mehnaz et al. (2018) ; Moore (2016) ; Shaukat and Ribeiro (2018) Machine Learning (API/System Calls) Al-Rimy et al. (2020) ; Al-rimy et al.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(2018) ; Mehnaz et al. (2018) ; Moore (2016) ; Shaukat and Ribeiro (2018) Machine Learning (API/System Calls) Al-Rimy et al. (2020) ; Al-rimy et al.…”
Section: Literature Reviewmentioning
confidence: 99%
“…All the experiments in this study were carried out in a sandbox environment with host computer CPU Intel (R) Core i7 @ 3.20 GH, the RAM is 16.0 GB and the host operating system is Linux Ubuntu 18.04, and Windows 7 guest operating system was used as a victim machine. Sandboxes are tools that are commonly used by malware analysts and researchers to conduct dynamic analysis [36,37]. They provide a means of detecting windows APIs invoked by a malware instance at the run time in a process called API hooking and DLL injection [38].…”
Section: A Experimental Setupmentioning
confidence: 99%
“…The malware binary files were downloaded from the public repository Vxheaven (https://www.vxheaven.org). Vxheaven dataset is a public repository that is commonly-used by previous malware analysis studies such as in [14,36,37,[40][41][42]. The malware dataset contains different types of malware families such as trojans, adware, backdoors, ransomware, viruses, and worms among many others.…”
Section: B Dataset Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…This harsh vehicular environment makes monitoring user activities in VANETs a challenging task, which opens the door for many types of attacks. Moreover, the decentralized nature of VANET makes it vulnerable to several types of attacks such as active interfering, passive eavesdropping, and others [2,[8][9][10]. Cybercriminals can disturb VANET operations and launch many types of attacks that might lead to accidents, congestions, and disruption of the network activities.…”
Section: Introductionmentioning
confidence: 99%