Majority Voting Ransomware Detection System
نویسندگان
چکیده
Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions the ever-changing dynamic landscape of ransomware detection. In majority cases, these described propose method based on result single test performed either executable code, process under investigation, its behaviour, or output. small subset systems, concept scorecard is employed where multiple tests are various aspects investigation their results then analysed using machine learning. The purpose this paper new voting approach by developing that uses cumulative score derived from discrete calculations algorithmic rather than heuristic techniques. describes 23 candidate tests, well 9 Windows API which validated determine both accuracy viability for use within system. Using calculation has several benefits, such immunity occasional inaccuracy individual when final classification. system can also leverage be comprehensive complimentary in an attempt achieve broader, deeper, more robust analysis program investigation. Additionally, collaborative significantly hinders masking modifying behaviour bypass achieved research demonstrate many high degree differentiating between benign malicious targets suggestions offered how combinations could adapted further improve accuracy.
منابع مشابه
Voting on Majority Rules∗
We analyze an overlapping generations model of voting on “reform projects”. These resemble investments in that they first require some investment expenditure and later pay off. Since the time during which old people get the benefit is shorter, or because older people are more wealthy and hence pay more taxes, they are more conservative (against reforms) than young people. We show that if people...
متن کاملIterated Majority Voting
We study a model in which a group of agents make a sequence of collective decisions on whether to remain in the current state of the system or switch to an alternative state, as proposed by one of them. Examples for instantiations of this model include the step-wise refinement of a bill of law by means of amendments to be voted on, as well as resource allocation problems, where agents successiv...
متن کاملExtinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection
Mobile ransomware is on the rise and effective defense from it is of utmost importance to guarantee security of mobile users’ data. Current solutions provided by antimalware vendors are signature-based and thus ineffective in removing ransomware and restoring the infected devices and files. Also, current state-of-the art literature offers very few solutions to effectively detecting and blocking...
متن کاملA Decision Support System For Handwritten Numerals Using Majority Voting
Feature extraction is an important step of pattern recognition. This study uses profile based feature extraction and uses Simple Profile (with cropping and without cropping image samples), Contour based feature extraction for recognizing handwritten numerals. The features are computed by using 48 X 48 as a feature length classifier used Back propagation neural network for the classification.. T...
متن کاملMajority voting on restricted domains
In judgment aggregation, unlike preference aggregation, not much is known about domain restrictions that guarantee consistent majority outcomes. We introduce several conditions on individual judgments su¢ cient for consistent majority judgments. Some are based on global orders of propositions or individuals, others on local orders, still others not on orders at all. Some generalize classic soci...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of information security
سال: 2023
ISSN: ['2153-1242', '2153-1234']
DOI: https://doi.org/10.4236/jis.2023.144016