Ransomware: stages, detection and evasion
Ransomware attacks has been increasing lately with companies suffer monetarily, wasted business opportunity and wasted time. Big companies are now targeted as they are more profitable for ransomware threat actor. This paper discuses on stages of ransomware attacks starting from reconnaissance to ext...
| Main Authors: | Yus Kamalrul, Mohamed Yunus, Syahrulanuar, Ngah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/35865/ http://umpir.ump.edu.my/id/eprint/35865/7/MCN19001%20Ransomware%20stages%2C%20detection%20and%20evation.submitted.pdf |
Similar Items
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Modular smart home using WiFi technology
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
Field programmable gate array based sigmoid function implementation using differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah
Published: (2021)
by: Syahrulanuar, Ngah
Published: (2021)
A Short Review for Ransomware: Pros and Cons
by: Shakir, Hasan Awni, et al.
Published: (2018)
by: Shakir, Hasan Awni, et al.
Published: (2018)
Two-Step Implementation of Sigmoid Function for Artificial Neural Network in Field Programmable Gate Array
by: Syahrulanuar, Ngah, et al.
Published: (2014)
by: Syahrulanuar, Ngah, et al.
Published: (2014)
Two-Steps Implementation of Sigmoid Function for Artificial Neural Network in Field Programmable Gate Array
by: Syahrulanuar, Ngah, et al.
Published: (2016)
by: Syahrulanuar, Ngah, et al.
Published: (2016)
Door Access System via Fingerprint with GSM (ReSMART)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Fuzzy skin detection
by: Tey, Yi Chin
Published: (2008)
by: Tey, Yi Chin
Published: (2008)
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Vehicle detection and tracking method
by: Suzana, Mohamed Salleh
Published: (2019)
by: Suzana, Mohamed Salleh
Published: (2019)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Object occlusion and object removal detection
by: Chai, Yung Joon
Published: (2015)
by: Chai, Yung Joon
Published: (2015)
Pedestrian Detection and Tracking in Surveillance Video
by: Chong, Penny
Published: (2016)
by: Chong, Penny
Published: (2016)
Dynamic modelling of a two-stage ATM Tandem Banyan Switch / Tham Hon Loke
by: Tham , Hon Loke
Published: (2002)
by: Tham , Hon Loke
Published: (2002)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Ascaris Lumbricoides Egg Detection from Digital Microscopic Fecal Sample Images
by: S.M., Sulong, et al.
Published: (2012)
by: S.M., Sulong, et al.
Published: (2012)
A rooting detection system and risk assessment for android mobile devices / Wael Farouk Mohamed Elsersy
by: Wael Farouk , Mohamed Elsersy
Published: (2022)
by: Wael Farouk , Mohamed Elsersy
Published: (2022)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A Review of External Wood Defect Detection
by: Jasni, Mohamad Zain, et al.
Published: (2009)
by: Jasni, Mohamad Zain, et al.
Published: (2009)
Similar Items
-
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021) -
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020) -
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022) -
Modular smart home using WiFi technology
by: Yus Kamalrul, Mohamed Yunus
Published: (2019) -
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022)