205
Views
2
CrossRef citations to date
0
Altmetric
Computers & Computing

Pre-Encryption and Identification (PEI): An Anti-crypto Ransomware Technique

ORCID Icon, ORCID Icon, ORCID Icon &

References

  • M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A survey on automated dynamic malware-analysis techniques and tools,” ACM. Comput. Surv., Vol. 44, no. 2, pp. 1–42, 2012.
  • D. Kim, D. Shin, D. Shin, and Y. H. Kim, “Attack detection application with attack tree for mobile system using log analysis,” Mobile Netw. Appl., Vol. 24, no. 1, pp. 184–192, 2019.
  • I. Kara, and M. Aydos, “Static and Dynamic Analysis of Third Generation Cerber Ransomware," International congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), IEEE, Ankara, Turkey, 2018, pp. 12–17.
  • A. Cohen, and N. Nissim, “Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory,” Expert. Syst. Appl., Vol. 102, pp. 158–178, 2018.
  • A. Mathur, and N. Idika. A survey of malware detection techniques; Department of Computer science. West Lafayette, IN, USA: Purdue University, 2007.
  • X. Wang, et al., “Survey on blockchain for internet of things,” Comput. Commun., Vol. 136, no. August 2018, pp. 10–29, 2019.
  • S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, R. Khayami, K. K. R. Choo, and D. E. Newton, “Drthis: Deep ransomware threat hunting and intelligence system at the fog layer,” Future Gener. Comput. Syst., Vol. 90, pp. 94–104, 2019.
  • A. Zimba, Z. Wang, and H. Chen, “Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems,” ICT Express, Vol. 4, no. 1, pp. 14–18, 2018.
  • F. Karbalaie, A. Sami, and M. Ahmadi, “Semantic malware detection by deploying graph mining,” International Journal of Computer Science Issues, Vol. 9, no. 1, pp. 373–379, 2012.
  • D. Sgandurra, L. Munoz-Gonz_alez, R. Mohsen, and E. C. Lupu. "Automated dynamic analysis of ransomware: Benefits, Limitations and use for Detection." arXiv:1609.03020. 2016.
  • S. Song, B. Kim, and S. Lee, “The effective ransomware prevention technique using process monitoring on android platform,” Mobile Information Systems, Vol. 2016, pp. 2946735, 2016. [CrossRef].
  • N. Scaife, H. Carter, P. Traynor, and K. R. B. Butler, “Cryptolock (and drop It): stopping ransomware attacks on user data,” in Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), Nara, Japan, 27–30 June 2016; pp. 303–312.
  • J. Hwang, J. Kim, S. Lee, and K. Kim, “Two-Stage ransomware detection using dynamic analysis and machine Learning techniques,” Wirel. Pers. Commun., Vol. 112, no. 4, pp. 2597–2609, 2020.
  • S. K. Shaukat, and V. J. Ribeiro, “Ransomwall: A layered defense system against cryptographic ransomware attacks using machine learning,” in Proceedings of the 2018 10th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, 3–7 January 2018.
  • M. Boldt, and B. Carlsson, “Analysing privacy-invasive software using computer forensic methods," ICECA, Papeetee, 2006.
  • H. Zhang, X. Xiao, F. Mercaldo, S. Ni, F. Martinelli, and A. K. Sangaiah, “Classification of ransomware families with machine learning based on N-gram of opcodes,” Future Gener. Comput. Syst., Vol. 90, pp. 211–221, 2019.
  • N. I. Ahmad-Azani, N. Yusoff, and K. R. Ku-Mahamud, “Fuzzy discretization technique for Bayesian flood disaster model,” Journal of Information and Communication Technology, Vol. 17, no. 2, pp. 167–189, 2018.
  • K. Fawagreh, M. M. Gaber, and E. Elyan, “Random forests: from early developments to recent advancements,” Systems Science & Control Engineering, Vol. 2, no. 1, pp. 602–609, 2014.
  • S. H. Kok, A. Abdullah, N. Z. Jhanjhi, and M. Supramaniam, “Ransomware, threat and detection techniques: A review,” Int. J. Comput. Sci. Netw. Secur, Vol. 19, no. 2, pp. 136–146, 2019.
  • A. Gowthaman, and M. Sumathi, “Performance study of enhanced SHA-256 algorithm,” Int. J. Appl. Eng. Res, Vol. 10, no. 4, pp. 10921–10932, 2015.
  • A. Tandon, and A. Nayyar, “A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat," International Conference on Data Management, Analytics and Innovation, 2019, pp. 403–420.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.