2019
DOI: 10.1002/cpe.5422
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware detection using machine learning algorithms

Abstract: Summary The number of ransomware variants has increased rapidly every year, and ransomware needs to be distinguished from the other types of malware to protect users' machines from ransomware‐based attacks. Ransomware is similar to other types of malware in some aspects, but other characteristics are clearly different. For example, ransomware generally conducts a large number of file‐related operations in a short period of time to lock or to encrypt files of a victim's machine. The signature‐based malware dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(46 citation statements)
references
References 19 publications
(18 reference statements)
0
42
0
2
Order By: Relevance
“…The experimental evaluation of this work claims that the ransomware activities can be identified through a unique low-level system calls that are present in the ransomware. Lorenzo Fernández et al [16], Suhyeon Lee [13], and Seong Il Bae et al [27] use dynamic analysis and supervised machine learning technique. The proposed approaches mostly focused on static, dynamic, or file monitoring approaches and face challenges to detect new variants of ransomware due to their supervised nature in detection engine.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The experimental evaluation of this work claims that the ransomware activities can be identified through a unique low-level system calls that are present in the ransomware. Lorenzo Fernández et al [16], Suhyeon Lee [13], and Seong Il Bae et al [27] use dynamic analysis and supervised machine learning technique. The proposed approaches mostly focused on static, dynamic, or file monitoring approaches and face challenges to detect new variants of ransomware due to their supervised nature in detection engine.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These n-gram sequences are used to identify ransomware and differentiate them from other malware and benign software. Each element of the input can be represented as "1" if an n-gram appears in the n-gram sequence or as "0" if the n-gram is not present in the sequence [23].…”
Section: Api Sequence-based Detectionmentioning
confidence: 99%
“…This technique is used to emphasise the features of each class, therefore giving further ability to differentiate between malware, ransomware and benign files. CF-NCF calculates weights on an element in a class, to provide a higher accuracy on classification experiments [23]. The calculation of this equation can be seen in Equations (16)- (18).…”
Section: Cf-ncf (Class Frequency-non-class Frequency)mentioning
confidence: 99%
See 2 more Smart Citations