Detection of Ransomware Attacks Using Processor and Disk Usage Data

Ransomware often evades antivirus tools, encrypts files, and renders the target computer and its data unusable. The current approaches to detect such ransomware include monitoring processes, system calls, and file activities on the target system and analyzing the data collected. Monitoring multiple...

Full description

Bibliographic Details
Main Authors: Kumar Thummapudi, Palden Lama, Rajendra V. Boppana
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10132856/