2021 International Conference on Engineering and Emerging Technologies (ICEET) 2021
DOI: 10.1109/iceet53442.2021.9659643
|View full text |Cite
|
Sign up to set email alerts
|

Review of Current Ransomware Detection Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 45 publications
0
14
0
Order By: Relevance
“…The research findings strongly advocate for an evolutionary shift in cybersecurity paradigms towards a more anticipatory defense mechanism [27], [11]. With ransomware attacks becoming increasingly intricate and personalized, there is a heightened need for cybersecurity defenses to progress beyond their traditional reactive stances [16], [36], [39]. This progression involves the integration and leveraging of advanced artificial intelligence and machine learning algorithms, which are capable of not just reacting to threats, but also predicting and pre-emptively mitigating potential risks [17], [10].…”
Section: B Strategic Adjustments In Cyber Defensementioning
confidence: 91%
See 1 more Smart Citation
“…The research findings strongly advocate for an evolutionary shift in cybersecurity paradigms towards a more anticipatory defense mechanism [27], [11]. With ransomware attacks becoming increasingly intricate and personalized, there is a heightened need for cybersecurity defenses to progress beyond their traditional reactive stances [16], [36], [39]. This progression involves the integration and leveraging of advanced artificial intelligence and machine learning algorithms, which are capable of not just reacting to threats, but also predicting and pre-emptively mitigating potential risks [17], [10].…”
Section: B Strategic Adjustments In Cyber Defensementioning
confidence: 91%
“…Despite extensive research endeavors in cybersecurity, prevailing methods for understanding and countering ransomware attacks are still not fully effective [5], [16]. Conventional antivirus and security software frequently fail to detect and thwart advanced ransomware attacks, which are constantly evolving to circumvent existing security protocols [17], [18].…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, modern variants employ advanced cryptographic techniques to encrypt data, making unauthorized decryption nearly impossible without a key [20]. The transition to crypto-ransomware marks a significant shift in the threat landscape [3]. This subsection delves into the technical evolution of ransomware, examining how changes in coding, distribution, and payload delivery have made recent strains more resilient and damaging [3].…”
Section: A Evolution and Mechanisms Of Ransomwarementioning
confidence: 99%
“…The transition to crypto-ransomware marks a significant shift in the threat landscape [3]. This subsection delves into the technical evolution of ransomware, examining how changes in coding, distribution, and payload delivery have made recent strains more resilient and damaging [3]. The mechanisms through which ransomware infiltrates systems have diversified over time [35].…”
Section: A Evolution and Mechanisms Of Ransomwarementioning
confidence: 99%
See 1 more Smart Citation