International Journal of Electrical, Electronics and Data Communication (IJEEDC)
eISSN:2320-2084 , pISSN:2321-2950
.
Follow Us On :
current issue
Volume-10,Issue-6  ( Jun, 2022 )
ARCHIVES
  1. Volume-10,Issue-5  ( May, 2022 )
  2. Volume-10,Issue-4  ( Apr, 2022 )
  3. Volume-10,Issue-3  ( Mar, 2022 )

Statistics report
Aug. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 114
Paper Published : 1562
No. of Authors : 4260
  Journal Paper


Paper Title :
Dynamic Ranking Scheme for Low Heuristic Footprint Activities on Static Ransomware Identification Scheme

Author :Shourya Bhattacharya, Sayantan Dana, Avikshit Banerjee, Ritangkar Dey

Article Citation :Shourya Bhattacharya ,Sayantan Dana ,Avikshit Banerjee ,Ritangkar Dey , (2017 ) " Dynamic Ranking Scheme for Low Heuristic Footprint Activities on Static Ransomware Identification Scheme " , International Journal of Electrical, Electronics and Data Communication (IJEEDC) , pp. 44-48, Volume-5,Issue-11

Abstract : In recent times the large scale spread of ransomware have effected operations of electronic and IT infrastructures more than it has had a chance to in previous years. The ransomwares have been able to get access of file systems of a number of systems as well as propagate through different kinds of security arrangements getting flagged at much lower success rates than expected. This work is divided into three parts. Part one of our work identifies how standard detection via flow analyzer can be bypassed with very low heuristic footprint code flow changes and how exploits are driven by such implications both in terms of network activities as well as local file system activities. Part two of this work proposes a dynamic ranking scheme for activities so that they can not bypass their position on heuristic ranking schemes. Part three of this work shows the experimental findings leading to the mathematical basis of our ranking scheme. Our work is an essential set of adaptations for a regular local scan to be able to successfully identify ransomware. Keywords - Network Security, ransomware identification, Vector based malware identification,heuristic analysis

Type : Research paper

Published : Volume-5,Issue-11


DOIONLINE NO - IJEEDC-IRAJ-DOIONLINE-10180   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 57
| Published on 2018-01-27
   
   
IRAJ Other Journals
IJEEDC updates
Volume-10,Issue-6(June,2022) Want to join us ? CLick here http://ijeedc.iraj.in/join_editorial_board.php
The Conference World

JOURNAL SUPPORTED BY

ADDRESS

Technical Editor, IJEEDC
Department of Journal and Publication
Plot no. 30, Dharma Vihar,
Khandagiri, Bhubaneswar, Odisha, India, 751030
Mob/Whatsapp: +91-9040435740