Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

Ransomware detection using the dynamic analysis and machine learning: A survey and research directions

U Urooj, BAS Al-rimy, A Zainal, FA Ghaleb… - Applied Sciences, 2021 - mdpi.com
Ransomware is an ill-famed malware that has received recognition because of its lethal and
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …

The age of ransomware: A survey on the evolution, taxonomy, and research directions

S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …

Intelligent and behavioral-based detection of malware in IoT spectrum sensors

AH Celdrán, PMS Sánchez, MA Castillo… - International Journal of …, 2023 - Springer
Abstract The number of Cyber-Physical Systems (CPS) available in industrial environments
is growing mainly due to the evolution of the Internet-of-Things (IoT) paradigm. In such a …

[HTML][HTML] Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic

E Berrueta, D Morato, E Magaña, M Izal - Expert Systems with Applications, 2022 - Elsevier
Ransomware is considered as a significant threat for home users and enterprises. In
corporate scenarios, users' computers usually store only system and program files, while all …

Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

R-Sentry: Deception based ransomware detection using file access patterns

S Sheen, KA Asmitha, S Venkatesan - Computers and Electrical …, 2022 - Elsevier
Ransomware has emerged as a major threat to users, resorting to file encryption and system
locking, demanding a ransom to release their files. Current mitigation techniques are …

Evaluating the Security Posture of Real-World FIDO2 Deployments

D Kuchhal, M Saad, A Oest, F Li - … of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
FIDO2 is a suite of protocols that combines the usability of local authentication (eg,
biometrics) with the security of public-key cryptography to deliver passwordless …

Majority voting ransomware detection system

SR Davies, R Macfarlane… - Journal of …, 2023 - napier-repository.worktribe.com
Crypto-ransomware remains a significant threat to governments and companies alike, with
high-profile cyber security incidents regularly making headlines. Many different detection …

On the effectiveness of perturbations in generating evasive malware variants

B Jin, J Choi, JB Hong, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Malware variants are generated using various evasion techniques to bypass malware
detectors, so it is important to understand what properties make them evade malware …