Aldauiji et al., 2022 - Google Patents
Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the artAldauiji et al., 2022
View PDF- Document ID
- 17748578578818596794
- Author
- Aldauiji F
- Batarfi O
- Bayousef M
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims' resources unusable by encrypting data or locking systems to extort ransom payments. Ransomware has variant families that continue to …
- 238000000034 method 0 title abstract description 90
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gopinath et al. | A comprehensive survey on deep learning based malware detection techniques | |
Aldauiji et al. | Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art | |
Poudyal et al. | Analysis of crypto-ransomware using ML-based multi-level profiling | |
Vidyarthi et al. | Static malware analysis to identify ransomware properties | |
AL-Maliki et al. | Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks | |
Cen et al. | Ransomware early detection: A survey | |
Akhtar | Malware detection and analysis: Challenges and research opportunities | |
Rao et al. | Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review. | |
Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
Jimmy | Understanding Ransomware Attacks: Trends and Prevention Strategies | |
Zakaria et al. | Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection | |
Smith et al. | Machine learning algorithms and frameworks in ransomware detection | |
Sharma et al. | Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach | |
Zakaria et al. | Early detection of windows cryptographic ransomware based on pre-attack api calls features and machine learning | |
Hamid et al. | Cyber Security: Analysis for Detection and Removal of Zero-Day Attacks (ZDA) | |
Maniriho et al. | A systematic literature review on Windows malware detection: Techniques, research issues, and future directions | |
Sneha et al. | Ransomware detection techniques in the dawn of artificial intelligence: A survey | |
Joraviya et al. | DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment | |
Singh et al. | It's too late if exfiltrate: Early stage Android ransomware detection | |
AlMasri et al. | Detecting Spyware in Android Devices Using Random Forest | |
Marimuthu et al. | Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach | |
Sarath et al. | Malware Forensics Analysis and Detection in Cyber Physical Systems | |
Ferdous et al. | Malware resistant data protection in hyper-connected networks: A survey | |
Radha Damodaram et al. | Bacterial foraging optimization for fake website detection | |
Hocosaj et al. | Detection of Stealthy Encryption in Ransomware Using AI-Driven Anomaly Detection Models |