Mostrar el registro sencillo del ítem
A survey on detection techniques for cryptographic ransomware
dc.creator | Berrueta Irigoyen, Eduardo | es_ES |
dc.creator | Morató Osés, Daniel | es_ES |
dc.creator | Magaña Lizarrondo, Eduardo | es_ES |
dc.creator | Izal Azcárate, Mikel | es_ES |
dc.date.accessioned | 2020-05-12T11:15:21Z | |
dc.date.available | 2020-05-12T11:15:21Z | |
dc.date.issued | 2019 | |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | https://hdl.handle.net/2454/36854 | |
dc.description.abstract | Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both companies and residential users, and has spread in recent years because of its lucrative results. Several articles have presented classifications of ransomware families and their typical behaviour. These insights have stimulated the creation of detection techniques for antivirus and firewall software. However, because the ransomware scene evolves quickly and aggressively, these studies quickly become outdated. In this study, we surveyed the detection techniques that the research community has developed in recent years. We compared the different approaches and classified the algorithms based on the input data they obtain from ransomware actions, and the decision procedures they use to reach a classification decision between benign or malign applications. This is a detailed survey that focuses on detection algorithms, compared to most previous studies that offer a survey of ransomware families or isolated proposals of detection algorithms. We also compared the results of these proposals. | en |
dc.description.sponsorship | This work was supported by the Spanish MINECO through project PIT (TEC2015-69417-C2-2-R). | en |
dc.format.extent | 20 p. | |
dc.format.mimetype | application/pdf | en |
dc.language.iso | eng | en |
dc.publisher | IEEE | en |
dc.relation.ispartof | IEEE Access, 2019, 7, 144925-144944 | en |
dc.rights | This work is licensed under a Creative Commons Attribution 4.0 License. | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
dc.subject | Computer security | en |
dc.subject | Malware detection | en |
dc.subject | Ransomware | en |
dc.title | A survey on detection techniques for cryptographic ransomware | en |
dc.type | info:eu-repo/semantics/article | en |
dc.type | Artículo / Artikulua | es |
dc.contributor.department | Ingeniería Eléctrica, Electrónica y de Comunicación | es_ES |
dc.contributor.department | Ingeniaritza Elektrikoa, Elektronikoa eta Telekomunikazio Ingeniaritza | eu |
dc.contributor.department | Institute of Smart Cities - ISC | es_ES |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | en |
dc.rights.accessRights | Acceso abierto / Sarbide irekia | es |
dc.identifier.doi | 10.1109/ACCESS.2019.2945839 | |
dc.relation.projectID | info:eu-repo/grantAgreement/MINECO//TEC2015-69417-C2-2-R/ES/ | en |
dc.relation.publisherversion | https://doi.org/10.1109/ACCESS.2019.2945839 | |
dc.type.version | info:eu-repo/semantics/publishedVersion | en |
dc.type.version | Versión publicada / Argitaratu den bertsioa | es |