2017
DOI: 10.1007/s12652-017-0558-5
|View full text |Cite
|
Sign up to set email alerts
|

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
98
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 220 publications
(99 citation statements)
references
References 34 publications
0
98
0
1
Order By: Relevance
“…This approach could be more robust compared to other detection techniques based on the behaviour or pattern profile of the device, since it is harder to hide or fake energy consumption characteristic. A paper by Azmoodeh et al (2017) demonstrated the feasibility of this energy consumption monitoring approach for detecting potential ransomware apps on Android devices. They managed to achieve a detection rate of 95.65% and a precision rate of 89.19%, which point to the feasibility of this approach.…”
Section: Tools and Strategies For Analysing Ransomwarementioning
confidence: 99%
“…This approach could be more robust compared to other detection techniques based on the behaviour or pattern profile of the device, since it is harder to hide or fake energy consumption characteristic. A paper by Azmoodeh et al (2017) demonstrated the feasibility of this energy consumption monitoring approach for detecting potential ransomware apps on Android devices. They managed to achieve a detection rate of 95.65% and a precision rate of 89.19%, which point to the feasibility of this approach.…”
Section: Tools and Strategies For Analysing Ransomwarementioning
confidence: 99%
“…The proposed approach failed due to the noise introduced by unpredictable user and environment interactions. More recent work by Azmoodeh et al [21] demonstrated that ransomware can be detected on Android devices by monitoring power consumption alone. These works differ from our approach in the way power data was collected.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, and in parallel with the development of local-level solutions, the research community studied the impact of the cryptoransomware on communication processes. This prompted the publication of the first proposals based on analyzing network features in emerging scenarios, as is the case of [10,58] at Internet of Things (IoT) or [42] at Cloud Computing. As indicated by Cabaj et al [8], the list of IP addresses with which each ransomware specimen tries to communicate with C&C server tends to be similar with those of previous detected threats.…”
Section: Countermeasuresmentioning
confidence: 99%