Leveraging machine learning techniques for Windows ransomware network traffic detection

作者: Omar M. K. Alhawi , James Baldwin , Ali Dehghantanha

DOI: 10.1007/978-3-319-73951-9_5

关键词: Machine learningPublic serviceRansomwareComputer scienceIntrusion detection systemClassifier (UML)Artificial intelligence

摘要: … , the network traffic samples are collected for both malicious (ransomware) and benign Windows applications. The feature extraction phase extracts the relevant features and merges …

参考文章(32)
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace, ReFormat: automatic reverse engineering of encrypted messages european symposium on research in computer security. pp. 200- 215 ,(2009) , 10.1007/978-3-642-04444-1_13
Imtithal A.Saeed, Ali Selamat, Ali M. A. Abuagoub, A survey on malware propagation, analysis, and detection International Journal of Computer Applications. ,vol. 67, pp. 25- 31 ,(2013) , 10.5120/11480-7108
Sotiris B. Kotsiantis, Supervised Machine Learning: A Review of Classification Techniques Informatica (lithuanian Academy of Sciences). ,vol. 31, pp. 249- 268 ,(2007)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Fairuz Amalina Narudin, Ali Feizollah, Nor Badrul Anuar, Abdullah Gani, Evaluation of machine learning classifiers for mobile malware detection soft computing. ,vol. 20, pp. 343- 357 ,(2016) , 10.1007/S00500-014-1511-6
Pratik Narang, Subhajit Ray, Chittaranjan Hota, Venkat Venkatakrishnan, PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations ieee symposium on security and privacy. pp. 108- 115 ,(2014) , 10.1109/SPW.2014.25
Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Ainuddin Wahid Abdul Wahab, A review on feature selection in mobile malware detection Digital Investigation. ,vol. 13, pp. 22- 37 ,(2015) , 10.1016/J.DIIN.2015.02.001
Stephen Ranshous, Shitian Shen, Danai Koutra, Steve Harenberg, Christos Faloutsos, Nagiza F. Samatova, Anomaly detection in dynamic networks: a survey Wiley Interdisciplinary Reviews: Computational Statistics. ,vol. 7, pp. 223- 247 ,(2015) , 10.1002/WICS.1347
Mohsen Damshenas, Ali Dehghantanha, Kim-Kwang Raymond Choo, Ramlan Mahmud, M0Droid: An Android Behavioral-Based Malware Detection Model Journal of Information Privacy and Security. ,vol. 11, pp. 141- 157 ,(2015) , 10.1080/15536548.2015.1073510