A Study On Approach To Ransomware Detection In Network Security
MLA Style:B.Manivannan, B. Revathi "A Study On Approach To Ransomware Detection In Network Security" International Journal of Computer Trends and Technology 67.11 (2019):84-88.
APA Style B.Manivannan, B. Revathi. A Study On Approach To Ransomware Detection In Network Security. International Journal of Computer Trends and Technology, 67(11),84-88.
Abstract
Ransomware is considered to be the most perilous malwares mostly used by the networking and cyber criminals in the recent years. This series of malwares uses cryptographic technology that mainly encrypts the significant files and folders of the users’ computer system and make it ineffectual for further use and conceals the decryption key and demand for a ransom from the victims to reinstate the files and folders to it original state. The contemporary Ransomware clans are very refined and challenging to scrutinise and detect using immobile features. Most likely the latest crytoransomwares in network security having sandboxing and IDS dodging capabilities which ensures a threat permanently. It is quite ardent that the static and dynamic analysis methods alone cannot provide the apt and fitting solution for the Ransomware in network security. In this article, we present a Machine Learning based approach with an assimilated method, a mixture of static and dynamic analysis to detect the ransomeware in network security. The experimental test samples were taken from different network security Ransomware based families. The results proposes that collective analysis can perceive ransomeware with improved accuracy when compared to individual approach for both static and dynamic.
Reference
[1] A. Gazet, “Comparative analysis of various ransomware virii,” Journal in computer virology, vol. 6, no. 1, pp. 77–90, 2010.
[2] Vadim Kotov and Mantej Singh Rajpal, “Understanding Crypto-Ransomware,” Report, Bromiun,2014.
[3] Ulrich Bayer, Andreas Moser, Christopher Kruegel, and Engin Kirda. “Dynamic analysis of malicious code,” Journal in Computer Virology, vol. 2, pp. 6777, 2006
[4] K. Murugan, P. Suresh ”Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad. Hoc Network,” International Journal of Network Security,, vol. 20, No.:4, pp. 730-737, 2018
[5] Mihai Christodorescu, and Somesh Jha, “Static Analysis of Executables to Detect Malicious Patterns,” Univ. of Wisconsin, Madison, US. (2006)
[6] Xu, M., Wu, L., Qi S., Xu, J., Zhang, H., Ren, Y., Zheng, N.: A similarity metric method of obfuscated malware using function-call graph. Journal in Computer Virology, 9 (2013), Issue 1, 35-47
[7] Chen X., Andersen J., Mao Z.M., Bailey M., Nazario, J., Towards an understanding of anti-virtualization and antidebugging behavior in modern malware," IEEE International Conference on Dependable Systems and Networks, (2008), 177-186
[8] Moser, A.; Kruegel, C.; Kirda, E., Limits of Static Analysis for Malware Detection, Computer Security Applications Conference, (2007) 421 - 430
[9] “Trend MIcro,” 6 Nov 2016. [Online]. Available: https://www.trendmicro.com/vinfo/us/security/researchandanalysis/ predictions/2017. [Accessed 2 04 2019].
[10] Nand Kumar Singh "Internet Filtration and Internet Neutrality". International Journal of Computer Trends and Technology (IJCTT) V49(3):155, July 2017. ISSN:2231- 2803. Published by Seventh Sense Research Group
Keywords
Ransomware, Crypto-ransomewares, Network Security, Static Analysis, Dynamic Analysis