Malware detection issues, challenges, and future directions: A survey

FA Aboaoja, A Zainal, FA Ghaleb, BAS Al-Rimy… - Applied Sciences, 2022 - mdpi.com
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

[HTML][HTML] Ransomware early detection by the analysis of file sharing traffic

D Morato, E Berrueta, E Magaña, M Izal - Journal of Network and Computer …, 2018 - Elsevier
Crypto ransomware is a type of malware that locks access to user files by encrypting them
and demands a ransom in order to obtain the decryption key. This type of malware has …

Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …

Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures

JF Colom, D Gil, H Mora, B Volckaert… - Journal of Network and …, 2018 - Elsevier
The evolving trends of mobility, cloud computing and collaboration have blurred the
perimeter separating corporate networks from the wider world. These new tools and …

Latent semantic analysis and graph theory for alert correlation: A proposed approach for iot botnet detection

M Lefoane, I Ghafir, S Kabir, I Awan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
In recent times, the proliferation of Internet of Things (IoT) technology has brought a
significant shift in the digital transformation of various industries. The enabling technologies …

A novel self-organizing network solution towards crypto-ransomware mitigation

MAS Monge, JM Vidal, LJG Villalba - Proceedings of the 13th …, 2018 - dl.acm.org
In the last decade, crypto-ransomware evolved from a family of malicious software with
scarce repercussion in the research community, to a sophisticated and highly effective …

Espada: Enhanced payload analyzer for malware detection robust against adversarial threats

JM Vidal, MAS Monge, SMM Monterrubio - Future Generation Computer …, 2020 - Elsevier
The emergent communication technologies landscape has consolidated the anomaly-based
intrusion detection paradigm as one of the most prominent solutions able to discover …

An effective ransomware detection approach in a cloud environment using volatile memory features

Prachi, S Kumar - Journal of Computer Virology and Hacking Techniques, 2022 - Springer
Cloud computing has become one of the most preferred solutions for enterprises to
implement and extend various enterprise applications. The importance of virtual servers in …

RaDaR: A Real-Word Dataset for AI powered Run-time Detection of Cyber-Attacks

S Karapoola, N Singh, C Rebeiro, KV - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Artificial Intelligence techniques on malware run-time behavior have emerged as a
promising tool in the arms race against sophisticated and stealthy cyber-attacks. While data …