Nothing Special   »   [go: up one dir, main page]

Aldauiji et al., 2022 - Google Patents

Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art

Aldauiji et al., 2022

View PDF
Document ID
17748578578818596794
Author
Aldauiji F
Batarfi O
Bayousef M
Publication year
Publication venue
IEEE Access

External Links

Snippet

Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims' resources unusable by encrypting data or locking systems to extort ransom payments. Ransomware has variant families that continue to …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks

Similar Documents

Publication Publication Date Title
Gopinath et al. A comprehensive survey on deep learning based malware detection techniques
Aldauiji et al. Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art
Poudyal et al. Analysis of crypto-ransomware using ML-based multi-level profiling
Vidyarthi et al. Static malware analysis to identify ransomware properties
AL-Maliki et al. Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks
Cen et al. Ransomware early detection: A survey
Akhtar Malware detection and analysis: Challenges and research opportunities
Rao et al. Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review.
Ávila et al. Use of security logs for data leak detection: a systematic literature review
Jimmy Understanding Ransomware Attacks: Trends and Prevention Strategies
Zakaria et al. Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection
Smith et al. Machine learning algorithms and frameworks in ransomware detection
Sharma et al. Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach
Zakaria et al. Early detection of windows cryptographic ransomware based on pre-attack api calls features and machine learning
Hamid et al. Cyber Security: Analysis for Detection and Removal of Zero-Day Attacks (ZDA)
Maniriho et al. A systematic literature review on Windows malware detection: Techniques, research issues, and future directions
Sneha et al. Ransomware detection techniques in the dawn of artificial intelligence: A survey
Joraviya et al. DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment
Singh et al. It's too late if exfiltrate: Early stage Android ransomware detection
AlMasri et al. Detecting Spyware in Android Devices Using Random Forest
Marimuthu et al. Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach
Sarath et al. Malware Forensics Analysis and Detection in Cyber Physical Systems
Ferdous et al. Malware resistant data protection in hyper-connected networks: A survey
Radha Damodaram et al. Bacterial foraging optimization for fake website detection
Hocosaj et al. Detection of Stealthy Encryption in Ransomware Using AI-Driven Anomaly Detection Models