Ransomware: Stages, detection and evasion
Ransomware attacks has been increasing lately with companies suffer monetarily, wasted business opportunity and wasted time. Big companies are now targeted as they are more profitable for ransomware threat actor. This paper discuses on stages of ransomware attacks starting from reconnaissance to ext...
| Main Authors: | Yus Kamalrul, Mohamed Yunus, Syahrulanuar, Ngah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2021
|
| Subjects: | |
| Online Access: | https://umpir.ump.edu.my/id/eprint/33285/ |
Similar Items
Ransomware: stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
A Short Review for Ransomware: Pros and Cons
by: Shakir, Hasan Awni, et al.
Published: (2018)
by: Shakir, Hasan Awni, et al.
Published: (2018)
Modular smart home using WiFi technology
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
Sigmoid function implementation using the unequal segmentation of differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah, et al.
Published: (2017)
by: Syahrulanuar, Ngah, et al.
Published: (2017)
Early stage writing application for beginners with precision evaluation (alphabet module)
by: Intan NurMarzliny, Mohd Akmallah
Published: (2013)
by: Intan NurMarzliny, Mohd Akmallah
Published: (2013)
Review of the Sigmoid Function Implementation into Digital Hardware
by: Syahrulanuar, Ngah, et al.
Published: (2015)
by: Syahrulanuar, Ngah, et al.
Published: (2015)
Local Position Estimation Using an Artificial Neural Network Based Model with a Hardware Implementation
by: Abdullah, Embong, et al.
Published: (2012)
by: Abdullah, Embong, et al.
Published: (2012)
Indoor positioning using artificial neural network with field programmable gate array implementation
by: Syahrulanuar, Ngah, et al.
Published: (2018)
by: Syahrulanuar, Ngah, et al.
Published: (2018)
Coinhive's monero drive-by crypto-jacking
by: Azizah, Abdul Aziz, et al.
Published: (2020)
by: Azizah, Abdul Aziz, et al.
Published: (2020)
Final Year Project Allocation System Techniques: A Systematic Literature Review
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Database System Model of Tender Management System in Kadastra
by: Noraziah, Ahmad, et al.
Published: (2007)
by: Noraziah, Ahmad, et al.
Published: (2007)
A two-stage method for identifying a smaller subset of genes in microarray data
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
Assessment Method Of Study Program: Results From Regression Analysis
by: Mohd Rashid, Ab Hamid, et al.
Published: (2015)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2015)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Solving linear and non-linear stiff system of ordinary differential equations by multi stage homotopy perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2016)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2016)
Selecting a smaller subset of informative genes from microarray data via a three-stage method
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024)
by: Keerthana, S.N, et al.
Published: (2024)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Die defect detection for integrated circuit using deep learning object detection techniques
by: Wong, Tack Hwa
Published: (2023)
by: Wong, Tack Hwa
Published: (2023)
Detection of presence marks in stegocontent
by: Chia Meng, Sia
Published: (2013)
by: Chia Meng, Sia
Published: (2013)
Human motion detection framework
by: Suzaimah, Ramli, et al.
Published: (2011)
by: Suzaimah, Ramli, et al.
Published: (2011)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Sistem Tempahan Makmal Komputer : Pendekatan Secara Workflow
by: Zainun, Ngah
Published: (2001)
by: Zainun, Ngah
Published: (2001)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Forced Convection of MHD Radiative Jeffrey Nanofluid Over a Moving Plate
by: Syazwani, Mohd Zokri, et al.
Published: (2021)
by: Syazwani, Mohd Zokri, et al.
Published: (2021)
Development of audit assignment tracking system prototype
by: Thanasegaran Subrayan,
Published: (2021)
by: Thanasegaran Subrayan,
Published: (2021)
Homotopy-perturbation method for solving linear and nonlinear differential equation
by: Chowdhury, Md. Sazzad Hossien
Published: (2015)
by: Chowdhury, Md. Sazzad Hossien
Published: (2015)
Neural networks optimization through genetic algorithm searches: A review
by: Chiroma, Haruna, et al.
Published: (2017)
by: Chiroma, Haruna, et al.
Published: (2017)
Development of An Artificial Conversational Entity As A Virtual Agent Top Offer Automated Helpdesk Support In College Housing Deveopment
by: Difo, Aldiaz
Published: (2010)
by: Difo, Aldiaz
Published: (2010)
A Study and Development of Web Based Social Interaction Platform with Assimilated Electronic Commerce and Weblog Functionalities
by: Rendy, Rendy
Published: (2010)
by: Rendy, Rendy
Published: (2010)
Analysis of WLAN Network Quality Improvement at Bank Mandiri Palembang Sudirman Area using Per Connection Queue Method
by: Misinem, ., et al.
Published: (2023)
by: Misinem, ., et al.
Published: (2023)
Utilizing Classifier Algorithms to Analyze Lending Activity at The Sumsel
Babel Bank's Pagar Alam Branch
by: Muhammad, Ichsan, et al.
Published: (2023)
by: Muhammad, Ichsan, et al.
Published: (2023)
Implementation of an Object-Oriented Goods Inventory Application
at PT XYZ
by: Setiawan, Restu Aji, et al.
Published: (2023)
by: Setiawan, Restu Aji, et al.
Published: (2023)
Similar Items
-
Ransomware: stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022) -
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020) -
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022) -
A Short Review for Ransomware: Pros and Cons
by: Shakir, Hasan Awni, et al.
Published: (2018) -
Modular smart home using WiFi technology
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)