Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms

Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Service (RaaS) model. RaaS enables criminals with a...

Full description

Bibliographic Details
Main Authors: Robert Bold, Haider Al-Khateeb, Nikolaos Ersotelos
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/24/12941