Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Service (RaaS) model. RaaS enables criminals with a...
Main Authors: | Robert Bold, Haider Al-Khateeb, Nikolaos Ersotelos |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/24/12941 |
Similar Items
-
Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art
by: Fatimah Aldauiji, et al.
Published: (2022-01-01) -
Impact of AI on the Cyber Kill Chain: A Systematic Review
by: Mateusz Kazimierczak, et al.
Published: (2024-12-01) -
A Comparative Assessment of Obfuscated Ransomware Detection Methods
by: Sergiu SECHEL
Published: (2019-01-01) -
The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions
by: Salwa Razaulla, et al.
Published: (2023-01-01) -
Operation Framework Including Cyber Warfare Execution Process and Operational Concepts
by: Sungjoong Kim, et al.
Published: (2020-01-01)