Dib et al., 2024 - Google Patents
Machine learning-based ransomware classification of Bitcoin transactionsDib et al., 2024
View HTML- Document ID
- 7402890349451625101
- Author
- Dib O
- Nan Z
- Liu J
- Publication year
- Publication venue
- Journal of King Saud University-Computer and Information Sciences
External Links
Snippet
Ransomware presents a significant threat to the security and integrity of cryptocurrency transactions. This research paper explores the intricacies of ransomware detection in cryptocurrency transactions using the Bitcoinheist dataset. The dataset encompasses 28 …
- 238000010801 machine learning 0 title abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zavrak et al. | Anomaly-based intrusion detection from network flow features using variational autoencoder | |
Liu et al. | SocInf: Membership inference attacks on social media health data with machine learning | |
Ozkan-Ozay et al. | A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions | |
Rastegari et al. | Evolving statistical rulesets for network intrusion detection | |
Dib et al. | Machine learning-based ransomware classification of Bitcoin transactions | |
Amanoul et al. | Intrusion detection systems based on machine learning algorithms | |
Durga et al. | A Novel Network Intrusion Detection System Based on Semi-Supervised Approach for IoT | |
Awad et al. | Addressing imbalanced classes problem of intrusion detection system using weighted extreme learning machine | |
Wang et al. | Practical blockchain-based steganographic communication via adversarial AI: A case study in bitcoin | |
Aljabri et al. | Intrusion detection in cyber-physical system using rsa blockchain technology | |
Alzoubi et al. | Research trends in deep learning and machine learning for cloud computing security | |
Dharaneish et al. | Comparative analysis of deep learning and machine learning models for network intrusion detection | |
Rahman et al. | Towards Developing Generative Adversarial Networks based Robust Intrusion Detection Systems for Imbalanced Dataset using Hadoop-PySpark | |
Kalusivalingam et al. | Enhancing B2B Fraud Detection Using Ensemble Learning and Anomaly Detection Algorithms | |
El Hajji et al. | Analysis of neural network training and cost functions impact on the accuracy of IDS and SIEM systems | |
Ganeshan et al. | I-AHSDT: intrusion detection using adaptive dynamic directive operative fractional lion clustering and hyperbolic secant-based decision tree classifier | |
Sripriyanka et al. | Securing IoMT: A Hybrid Model for DDoS Attack Detection and COVID-19 Classification | |
Mounnan et al. | A review on deep anomaly detection in Blockchain | |
Giray et al. | Evaluation and comparison of classification techniques for network intrusion detection | |
Hendaoui et al. | SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection | |
Fernando | Fesad: Ransomware detection with machine learning using adaption to concept drift | |
Bingu et al. | Performance comparison analysis of classification methodologies for effective detection of intrusions | |
Mandali | Transfer Learning based Intrusion Detection Systems | |
Chattopadhyay | Modelling of intrusion detection system using artificial intelligence—evaluation of performance measures | |
Dwan Jr et al. | Predictive Analysis: Machine Learning Models for URL Classification |