The BitcoinHeist: Classifications of Ransomware Crime Families
نویسندگان
چکیده
Ransomware attacks are on the rise and attackers hijacking valuable information from different critical infrastructures businesses requiring ransom payments to release encrypted files. Payments in cryptocurrencies designed evade tracing transactions recipients. With anonymity being paramount, due malicious activity criminal is a complicated process. Therefore, need identify these label them crucial categorize as legitimate digital currency trade exchange or operations. Machine learning techniques utilized train machine recognize specific trace back benign ones. I propose work Bitcoin Heist data set classify transactions. The features analyzed predict classifier among classifiers that have been identified ransomware associated with activity. use decision tree ensemble implement random forest classifier. Results assessed evaluate accuracy, precision, recall. limit study design known previously made available under transaction graph January 2009 December 2018.
منابع مشابه
Linguistic spatial classifications of event domains in narratives of crime
Structurally, formal definitions of the linguistic narrative minimally require two temporally linked past-time events. The role of space in this definition, based on spatial language indicating where events occur, is considered optional and non-structural. However, based on narratives with a high frequency of spatial language, recent research has questioned this perspective, suggesting that spa...
متن کاملOn the Economics of Ransomware
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with the ongoing attack waves. At the same time, our strategic understanding of the threat and the adversarial interaction between organizations an...
متن کاملExtinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection
Mobile ransomware is on the rise and effective defense from it is of utmost importance to guarantee security of mobile users’ data. Current solutions provided by antimalware vendors are signature-based and thus ineffective in removing ransomware and restoring the infected devices and files. Also, current state-of-the art literature offers very few solutions to effectively detecting and blocking...
متن کاملRAPTOR: Ransomware Attack PredicTOR
Ransomware, a type of malicious software that encrypts a victim’s files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers’ operations to forecast ransomware activity. More specifi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Science and Information Technology
سال: 2021
ISSN: ['0975-4660', '0975-3826']
DOI: https://doi.org/10.5121/ijcsit.2021.13506