2020
DOI: 10.4018/ijwp.2020010101
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Traffic Classification Using Deep Learning Models

Abstract: Ransomware is a malware which affects the systems data with modern encryption techniques, and the data is recovered once a ransom amount is paid. In this research, the authors show how ransomware propagates and infects devices. Live traffic classifications of ransomware have been meticulously analyzed. Further, a novel method for the classification of ransomware traffic by using deep learning methods is presented. Based on classification, the detection of ransomware is approached with the characteristics of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…In the database persistence layer, Hibernate automatically maps the database and JavaBeans through hbm.xml files so that programmers can manipulate Java beans to operate the database and return the results of the operation to the business layer. After the business layer finishes processing, it returns the results to the control layer and finally receives the response through JSP [13,14].…”
Section: System Architecture Implementation Processmentioning
confidence: 99%
“…In the database persistence layer, Hibernate automatically maps the database and JavaBeans through hbm.xml files so that programmers can manipulate Java beans to operate the database and return the results of the operation to the business layer. After the business layer finishes processing, it returns the results to the control layer and finally receives the response through JSP [13,14].…”
Section: System Architecture Implementation Processmentioning
confidence: 99%
“…The solutions being used in the market for managing a UAV would not be feasible for a network of drones with rapid task distribution. As a part of this FSA approach, the drones in the network are treated as sensor node in a WSN (Arivudainambi et al , 2020). This ensures unbiased communication among the drones in the network.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The script which contains the python language has the powers to connect the remote host of the IP list with the libraries which contains it by utilising the multi-threaded concepts. The messages transferring through this libraries have secure shell key for running the specific commands and get the access over the honeypot as well as monitoring the systems too [41]. The honey pots are controlled by honeynet systems which delivers honeypots to various physical machines which the setup is shown in Figs.…”
Section: Overall Architecture A) Data Servermentioning
confidence: 99%