2021
DOI: 10.1016/j.future.2020.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
61
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(62 citation statements)
references
References 66 publications
1
61
0
Order By: Relevance
“…All the experiments in this study were carried out in a sandbox environment with host computer CPU Intel (R) Core i7 @ 3.20 GH, the RAM is 16.0 GB and the host operating system is Linux Ubuntu 18.04, and Windows 7 guest operating system was used as a victim machine. Sandboxes are tools that are commonly used by malware analysts and researchers to conduct dynamic analysis [36,37]. They provide a means of detecting windows APIs invoked by a malware instance at the run time in a process called API hooking and DLL injection [38].…”
Section: A Experimental Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…All the experiments in this study were carried out in a sandbox environment with host computer CPU Intel (R) Core i7 @ 3.20 GH, the RAM is 16.0 GB and the host operating system is Linux Ubuntu 18.04, and Windows 7 guest operating system was used as a victim machine. Sandboxes are tools that are commonly used by malware analysts and researchers to conduct dynamic analysis [36,37]. They provide a means of detecting windows APIs invoked by a malware instance at the run time in a process called API hooking and DLL injection [38].…”
Section: A Experimental Setupmentioning
confidence: 99%
“…The malware binary files were downloaded from the public repository Vxheaven (https://www.vxheaven.org). Vxheaven dataset is a public repository that is commonly-used by previous malware analysis studies such as in [14,36,37,[40][41][42]. The malware dataset contains different types of malware families such as trojans, adware, backdoors, ransomware, viruses, and worms among many others.…”
Section: B Dataset Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The efforts of security professionals and researches have converged to fight ransomware attacks [5,6]. They work side-by-side to detect, prevent, and mitigate such attacks and their potential effect.…”
Section: Introductionmentioning
confidence: 99%
“…Feature selection [ 1 5 ] differs from other data dimensionality reduction techniques (e.g., feature extraction) [ 6 ] in that feature selection focuses on analysing the relevance and redundancy in high-dimensional data, removing as many irrelevant and redundant features as possible and retaining the relevant original physical features. This approach not only improves the data quality and classification performance but also reduces the training time of the model and makes it more interpretable [ 7 9 ].…”
Section: Introductionmentioning
confidence: 99%