Keyogeg et al., 2024 - Google Patents
Automated detection of ransomware in windows active directory domain services using log analysis and machine learningKeyogeg et al., 2024
View PDF- Document ID
- 17939774115418809769
- Author
- Keyogeg B
- Thompson M
- Dawson G
- Wagner D
- Johnson G
- Elliott B
- Publication year
- Publication venue
- Authorea Preprints
External Links
Snippet
Ransomware continues to pose one of the most severe cybersecurity challenges, particularly in enterprise environments that rely on Active Directory Domain Services (AD DS) for managing network resources and permissions. The detection of ransomware in AD …
- 238000001514 detection method 0 title abstract description 90
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Keyogeg et al. | Automated detection of ransomware in windows active directory domain services using log analysis and machine learning | |
Mirsky et al. | The threat of offensive ai to organizations | |
Kaur et al. | A survey on zero-day polymorphic worm detection techniques | |
Loco et al. | Adaptive behavior-based ransomware detection via dynamic flow signatures | |
Alzonem et al. | Ransomware detection using convolutional neural networks and isolation forests in network traffic patterns | |
Omar | Machine learning for cybersecurity: Innovative deep learning solutions | |
Viddiu et al. | Automated ransomware detection using windows file system activity monitoring and a novel machine learning approach | |
Eisenwer et al. | Automated detection of ransomware using dynamic code sequence mapping | |
Alqahtani et al. | A proposed crypto-ransomware early detection (CRED) model using an integrated deep learning and vector space model approach | |
Park et al. | Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks | |
LaRocque et al. | Effective ransomware detection using autonomous patternbased signature extraction | |
Limer et al. | Automated ransomware detection using dynamic behavior trace profiling | |
Tidjon et al. | Threat assessment in machine learning based systems | |
Zakaria et al. | Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection | |
Thomas | Machine Learning Applications for Cybersecurity | |
Diavka et al. | Comprehensive ransomware detection using dynamic behavior profiling | |
Rani et al. | Analysis of machine learning and deep learning intrusion detection system in Internet of Things network | |
Muggler et al. | Cybersecurity management through logging analytics | |
Adelusola | Enhancing Cybersecurity with Machine Learning Techniques: A Comprehensive Approach to Threat Detection and Risk Mitigation | |
Sandler et al. | A new framework for ransomware detection using dynamic encryption pattern analysis | |
Petersen | Detecting network intrusions | |
Risban et al. | Dynamic crypto-behavioral profiling for autonomous ransomware detection | |
Taj | A Machine Learning Framework for Host Based Intrusion Detection using System Call Abstraction | |
Sarath et al. | Malware Forensics Analysis and Detection in Cyber Physical Systems | |
Tyagi et al. | Artificial Intelligence for Malware Analysis: A Systematic Study |