Publicação
Mechanisms for analysis and detection of ransomware in desktop operating systems
| Resumo: | Ransomware attacks have become a danger to computer systems, leading to data loss, monetary losses, and business interruptions. We propose a machine learning-based method for ransomware detection on Linux to identify these attacks. To detect ransomware activity on the system, our approach combines the file system with a predictive model. To obtain sufficient infection information we use the data from the alteration calls to the files on the file system. This data is then fed into a machine-learning algorithm. Using a dataset we collected from uninfected files and files infected with various types of ransomware and were able to achieve a high detection rate with a low false positive rate. Our methodology can be incorporated into current security programs to improve detection and defense against ransomware attacks in the Linux environment. |
|---|---|
| Autores principais: | Santos, Vinicius Belloli dos |
| Assunto: | Ransomware Malware Cybersecurity Threat detection Linux |
| Ano: | 2023 |
| País: | Portugal |
| Tipo de documento: | dissertação de mestrado |
| Tipo de acesso: | acesso aberto |
| Instituição associada: | Instituto Politécnico de Bragança |
| Idioma: | inglês |
| Origem: | Biblioteca Digital do IPB |
Registos relacionados
article OwlSight: Platform for Real-time Detection and Visualization of Cyber Threats
por: Carvalho, Vasco Samuel
Publicado em: (2016)
por: Carvalho, Vasco Samuel
Publicado em: (2016)
school Advancing malware defense
por: Lima, Rodrigo França
Publicado em: (2024)
por: Lima, Rodrigo França
Publicado em: (2024)
school An utility function for assessing the cost of recovering from ransomware attacks
por: Pinto, Luís Filipe dos Santos
Publicado em: (2025)
por: Pinto, Luís Filipe dos Santos
Publicado em: (2025)
school Ransomware behaviour analysis in Linux environment
por: Dias, Ricardo Cunha
Publicado em: (2024)
por: Dias, Ricardo Cunha
Publicado em: (2024)
assignment Battlefield malware and the fight against cyber crime
por: Omar, Marwan
Publicado em: (2021)
por: Omar, Marwan
Publicado em: (2021)
groups Malware hash cloud
por: Ferreira, Paulo
Publicado em: (2017)
por: Ferreira, Paulo
Publicado em: (2017)
article Advances in NLP Techniques for Detection of Message-Based Threats in Digital Platforms: A Systematic Review
por: Saias, José
Publicado em: (2025)
por: Saias, José
Publicado em: (2025)
school Aplicações de modelos de linguagem de grande escala na cibersegurança
por: Conceição, Tiago Miguel Pestana
Publicado em: (2025)
por: Conceição, Tiago Miguel Pestana
Publicado em: (2025)
school File sharing anomaly detection in business environments
por: Mota, João Manuel Ribeiro
Publicado em: (2018)
por: Mota, João Manuel Ribeiro
Publicado em: (2018)
school RESPOSTA A INCIDENTES DE SEGURANÇA POR RANSOMWARE
por: Silva, Catarina Rodrigues do Nascimento
Publicado em: (2024)
por: Silva, Catarina Rodrigues do Nascimento
Publicado em: (2024)
school Malware detection based on dynamic analysis features
por: Duque, João Guilherme de Lourenço Vieira
Publicado em: (2020)
por: Duque, João Guilherme de Lourenço Vieira
Publicado em: (2020)
article Automated android malware detection using user feedback
por: Duque, J.
Publicado em: (2022)
por: Duque, J.
Publicado em: (2022)
school Detection of anomalous human behavior in the use of DNS
por: Costa, Carlos Rafael de Jesus Palma
Publicado em: (2024)
por: Costa, Carlos Rafael de Jesus Palma
Publicado em: (2024)
school Detection of illicit software Bot activities over DNS
por: Aguiar, Bruno Filipe Oliveira
Publicado em: (2022)
por: Aguiar, Bruno Filipe Oliveira
Publicado em: (2022)
assignment Cibercriminalidade e Cibersegurança
por: Moreira, Fernando
Publicado em: (2019)
por: Moreira, Fernando
Publicado em: (2019)
article Phishing and advanced persistent threats
por: Brandao, Pedro Ramos
Publicado em: (2022)
por: Brandao, Pedro Ramos
Publicado em: (2022)
school Linux based mobile: operating systems
por: Cardoso, Diogo Sérgio Esteves
Publicado em: (2015)
por: Cardoso, Diogo Sérgio Esteves
Publicado em: (2015)
article Intrusion detection systems in Internet of Things: A literature review
por: Simões Santos, Leonel Filipe
Publicado em: (2018)
por: Simões Santos, Leonel Filipe
Publicado em: (2018)
school Analyzing IDS botnets detection
por: Binda, Kahe Henrique
Publicado em: (2020)
por: Binda, Kahe Henrique
Publicado em: (2020)
school Hardware accelerated real-time Linux video anonymizer
por: Magalhães, Fábio Duarte Rodrigues
Publicado em: (2022)
por: Magalhães, Fábio Duarte Rodrigues
Publicado em: (2022)
school Intrusion detection system, a decentralized approach using multi-agent systems and machine learning
por: Castro, Nathan Cesa Nery De
Publicado em: (2025)
por: Castro, Nathan Cesa Nery De
Publicado em: (2025)
article Secure data exchange in Industrial Internet of Things
por: Sukiasyan, Anna
Publicado em: (2022)
por: Sukiasyan, Anna
Publicado em: (2022)
school Sistema baseado na web para deteção e apresentação de vulnerabilidades em aplicações Android
por: Candello, Raphael Alexandre Sperandio
Publicado em: (2019)
por: Candello, Raphael Alexandre Sperandio
Publicado em: (2019)
school Malware detection in android applications with machine learning techniques
por: Palma, Catarina Rodrigues
Publicado em: (2023)
por: Palma, Catarina Rodrigues
Publicado em: (2023)
school Aquisição e modelação de Threat Intelligence para desenvolver um sistema de reputação
por: Costa, Mário João Amaro da
Publicado em: (2022)
por: Costa, Mário João Amaro da
Publicado em: (2022)
school Robustness of AI models in software vulnerability detection
por: GONÇALVES, JOSÉ PEDRO SOUSA
Publicado em: (2025)
por: GONÇALVES, JOSÉ PEDRO SOUSA
Publicado em: (2025)
school Intrusion detection system in software-defined networks
por: Leite, Vinicius Lopes
Publicado em: (2023)
por: Leite, Vinicius Lopes
Publicado em: (2023)
article OSSEC IDS extension to improve log analysis and override false positive or negative detections
por: Teixeira, Diogo
Publicado em: (2019)
por: Teixeira, Diogo
Publicado em: (2019)
groups Evaluation of AI-based Malware Detection in IoT Network Traffic
por: Prazeres, Nuno
Publicado em: (2022)
por: Prazeres, Nuno
Publicado em: (2022)
school Detection of compromised devices or user credentials
por: Silva, João Manuel Castanheira da
Publicado em: (2025)
por: Silva, João Manuel Castanheira da
Publicado em: (2025)
school Quantifying cyber risk with FAIR : a case-study of Super Bock Bebidas, S.A.
por: Cardoso, Patrícia Alves
Publicado em: (2025)
por: Cardoso, Patrícia Alves
Publicado em: (2025)
school Captura, análise e identificação de malware: caso de estudo
por: Ferreira, Ricardo Sérgio Freitas
Publicado em: (2015)
por: Ferreira, Ricardo Sérgio Freitas
Publicado em: (2015)
article Intrusion and anomaly detection for the next-generation of industrial automation and control systems
por: Rosa, Luis
Publicado em: (2021)
por: Rosa, Luis
Publicado em: (2021)
article Explainable machine learning for malware detection on Android applications
por: Palma, Catarina
Publicado em: (2024)
por: Palma, Catarina
Publicado em: (2024)
article Using Java and Linux to crack the DES challenge
por: Serrão, Carlos
Publicado em: (1999)
por: Serrão, Carlos
Publicado em: (1999)
school Evaluating institutional awareness of physical social engineering threats using a specialized toolkit
por: Sauce, Telmo Nicolas Bela
Publicado em: (2025)
por: Sauce, Telmo Nicolas Bela
Publicado em: (2025)
school Painel de higiene cibernética para o CISO
por: Cristo, João Pacheco
Publicado em: (2025)
por: Cristo, João Pacheco
Publicado em: (2025)
school Modelo comportamental de ataques em redes informáticas
por: Sousa, Roberto Miguel Marques de
Publicado em: (2014)
por: Sousa, Roberto Miguel Marques de
Publicado em: (2014)
school Malware Analysis with Machine Learning
por: Cruz, João Pedro Matias
Publicado em: (2022)
por: Cruz, João Pedro Matias
Publicado em: (2022)
school INTEGRATION OF GENERIC OPERATING SYSTEMS IN PARTITIONED ARCHITECTURES
por: Craveiro, João Pedro Gonçalves Crespo
Publicado em: (2009)
por: Craveiro, João Pedro Gonçalves Crespo
Publicado em: (2009)
Registos relacionados
-
article OwlSight: Platform for Real-time Detection and Visualization of Cyber Threats
por: Carvalho, Vasco Samuel
Publicado em: (2016) -
school Advancing malware defense
por: Lima, Rodrigo França
Publicado em: (2024) -
school An utility function for assessing the cost of recovering from ransomware attacks
por: Pinto, Luís Filipe dos Santos
Publicado em: (2025) -
school Ransomware behaviour analysis in Linux environment
por: Dias, Ricardo Cunha
Publicado em: (2024) -
assignment Battlefield malware and the fight against cyber crime
por: Omar, Marwan
Publicado em: (2021)