2020
DOI: 10.1016/j.asoc.2020.106630
|View full text |Cite
|
Sign up to set email alerts
|

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0
1

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(31 citation statements)
references
References 20 publications
0
30
0
1
Order By: Relevance
“…Deep learning approaches have been proposed by researchers to detect malware in the Bitcoin system [8]. In this reference [15], the authors used Long-Short Term Memory (LSTM) to detect ransomware.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Deep learning approaches have been proposed by researchers to detect malware in the Bitcoin system [8]. In this reference [15], the authors used Long-Short Term Memory (LSTM) to detect ransomware.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, it overcomes the vanishing gradient problem of classical Recurrent Neural Networks (RNN) [15]. Abbas Yazdinejad et al [8] also used LSTM to detect cryptocurrency malware on Windows Operating System. The dataset used in this research consists of 200 legal cryptocurrency samples and 500 cryptocurrency malware samples.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…To cope with sequences that exhibit time dependencies, a long short-term memory (LSTM) neural network structure is adopted. LSTM can efficiently predict the objects of a series of inputs, and it is widely used in security scenarios such as threats hunting in IoT and malware detection [45]. The input layer of LSTM is associated with a time series, and LSTM can evaluate the impact of different time steps and influence the final output, which is the next network flow after the input sequence in this paper.…”
Section: F Model Trainingmentioning
confidence: 99%
“…E-mail is frequently used as a vital medium of communication. We also see E-mails being used by cybercriminals to commit crimes [9]. Current and emerging threat agents are increasingly targeting complex, extensive data networks in modern organizations [10].…”
Section: Introductionmentioning
confidence: 99%