Nothing Special   »   [go: up one dir, main page]

Dib et al., 2024 - Google Patents

Machine learning-based ransomware classification of Bitcoin transactions

Dib et al., 2024

View HTML
Document ID
7402890349451625101
Author
Dib O
Nan Z
Liu J
Publication year
Publication venue
Journal of King Saud University-Computer and Information Sciences

External Links

Snippet

Ransomware presents a significant threat to the security and integrity of cryptocurrency transactions. This research paper explores the intricacies of ransomware detection in cryptocurrency transactions using the Bitcoinheist dataset. The dataset encompasses 28 …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Similar Documents

Publication Publication Date Title
Zavrak et al. Anomaly-based intrusion detection from network flow features using variational autoencoder
Liu et al. SocInf: Membership inference attacks on social media health data with machine learning
Ozkan-Ozay et al. A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions
Rastegari et al. Evolving statistical rulesets for network intrusion detection
Dib et al. Machine learning-based ransomware classification of Bitcoin transactions
Amanoul et al. Intrusion detection systems based on machine learning algorithms
Durga et al. A Novel Network Intrusion Detection System Based on Semi-Supervised Approach for IoT
Awad et al. Addressing imbalanced classes problem of intrusion detection system using weighted extreme learning machine
Wang et al. Practical blockchain-based steganographic communication via adversarial AI: A case study in bitcoin
Aljabri et al. Intrusion detection in cyber-physical system using rsa blockchain technology
Alzoubi et al. Research trends in deep learning and machine learning for cloud computing security
Dharaneish et al. Comparative analysis of deep learning and machine learning models for network intrusion detection
Rahman et al. Towards Developing Generative Adversarial Networks based Robust Intrusion Detection Systems for Imbalanced Dataset using Hadoop-PySpark
Kalusivalingam et al. Enhancing B2B Fraud Detection Using Ensemble Learning and Anomaly Detection Algorithms
El Hajji et al. Analysis of neural network training and cost functions impact on the accuracy of IDS and SIEM systems
Ganeshan et al. I-AHSDT: intrusion detection using adaptive dynamic directive operative fractional lion clustering and hyperbolic secant-based decision tree classifier
Sripriyanka et al. Securing IoMT: A Hybrid Model for DDoS Attack Detection and COVID-19 Classification
Mounnan et al. A review on deep anomaly detection in Blockchain
Giray et al. Evaluation and comparison of classification techniques for network intrusion detection
Hendaoui et al. SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection
Fernando Fesad: Ransomware detection with machine learning using adaption to concept drift
Bingu et al. Performance comparison analysis of classification methodologies for effective detection of intrusions
Mandali Transfer Learning based Intrusion Detection Systems
Chattopadhyay Modelling of intrusion detection system using artificial intelligence—evaluation of performance measures
Dwan Jr et al. Predictive Analysis: Machine Learning Models for URL Classification