An effective ransomware detection approach in a cloud environment using volatile memory features

[1]  C. Rama Krishna,et al.  RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique , 2021, Digit. Investig..

[2]  Francesco Mercaldo,et al.  A framework for supporting ransomware detection and prevention based on hybrid analysis , 2021, Journal of Computer Virology and Hacking Techniques.

[3]  Jinsoo Hwang,et al.  Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques , 2020, Wirel. Pers. Commun..

[4]  Gerardo Canfora,et al.  LEILA: Formal Tool for Identifying Mobile Malicious Behaviour , 2019, IEEE Transactions on Software Engineering.

[5]  Mikel Izal,et al.  Ransomware early detection by the analysis of file sharing traffic , 2018, J. Netw. Comput. Appl..

[6]  Elisa Bertino,et al.  RWGuard: A Real-Time Detection System Against Cryptographic Ransomware , 2018, RAID.

[7]  Yuval Elovici,et al.  Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining , 2018, Knowl. Based Syst..

[8]  Nir Nissim,et al.  Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory , 2018, Expert Syst. Appl..

[9]  Joongheon Kim,et al.  POSTER: Mining with Proof-of-Probability in Blockchain , 2018, AsiaCCS.

[10]  Ali Dehghantanha,et al.  Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection , 2018, ArXiv.

[11]  L. Javier García-Villalba,et al.  Alert correlation framework for malware detection by anomaly-based packet payload analysis , 2017, J. Netw. Comput. Appl..

[12]  Prabaharan Poornachandran,et al.  Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).

[13]  K. P. Soman,et al.  Evaluating shallow and deep networks for ransomware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[14]  Thomas Barabosch,et al.  Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps , 2017, DIMVA.

[15]  Fabio Martinelli,et al.  R-PackDroid: API package-based characterization and detection of mobile ransomware , 2017, SAC.

[16]  Gianluca Stringhini,et al.  PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.

[17]  Daniele Sgandurra,et al.  Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection , 2016, ArXiv.

[18]  Wojciech Mazurczyk,et al.  Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall , 2016, IEEE Network.

[19]  Engin Kirda,et al.  UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.

[20]  Patrick Traynor,et al.  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[21]  Vinay Avasthi,et al.  Ransomware Digital Extortion: A Rising New Age Threat , 2016 .

[22]  Jaeyeon Moon,et al.  Ransomware Analysis and Method for Minimize the Damage , 2016 .

[23]  Stefano Zanero,et al.  HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.

[24]  S. Dija,et al.  Extraction of memory forensic artifacts from windows 7 RAM image , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[25]  Lianhai Wang,et al.  Extracting windows registry information from physical memory , 2011, 2011 3rd International Conference on Computer Research and Development.

[26]  D. Nieuwenhuizen A behavioural-based approach to ransomware detection , 2017 .

[27]  Baoxu Liu,et al.  Poster : A New Approach to Detecting Ransomware with Deception , 2017 .