2020
DOI: 10.1109/access.2020.2970466
|View full text |Cite
|
Sign up to set email alerts
|

Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches

Abstract: Digital extortion has become a major cyber risk for many organizations; small-medium enterprises (SME) to large enterprises business and individual entrepreneurs. Ransomware is a kind of malware that is the main threat to digital extortion and has caused many organizations to lose huge revenue by paying much bigger ransom demands to the cybercriminals in recent years. The explosive growth of ransomware is due to the existing large infection vector such as social engineering, email attachment, zip file download… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(39 citation statements)
references
References 28 publications
0
39
0
Order By: Relevance
“…The following industries were particularly targeted: transportation, healthcare, financial services, and government ( Alshaikh et al., 2020 ). The number of ransomware attacks has grown exponentially thanks to easily obtainable ransomware toolkits and ransomware-as-a-service (RaaS) that allows novices to launch ransomware attacks ( Sharmeen et al., 2020 ).…”
Section: Introductionmentioning
confidence: 99%
“…The following industries were particularly targeted: transportation, healthcare, financial services, and government ( Alshaikh et al., 2020 ). The number of ransomware attacks has grown exponentially thanks to easily obtainable ransomware toolkits and ransomware-as-a-service (RaaS) that allows novices to launch ransomware attacks ( Sharmeen et al., 2020 ).…”
Section: Introductionmentioning
confidence: 99%
“…Basicly, the instruction compression here must satisfy that the compression result can be analysed by the corresponding model without decompression. So it is different from the common compression algorithm [17] [18] used in our daily life. And we can find many related works satisfying this point [19] [20].…”
Section: ) How To Collect the Source Instructions When Facing The Compression Encryption?mentioning
confidence: 92%
“…With an objective to overcome the limitations of supervised learning algorithms, Sharmeen et al [27] have proposed a semi-supervised framework to learn unique ransomware behavioral patterns using deep learning techniques. They claim that their model is scalable to accommodate new variants of malware executable.…”
Section: Literature Reviewmentioning
confidence: 99%