[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Keyogeg et al., 2024 - Google Patents

Automated detection of ransomware in windows active directory domain services using log analysis and machine learning

Keyogeg et al., 2024

View PDF
Document ID
17939774115418809769
Author
Keyogeg B
Thompson M
Dawson G
Wagner D
Johnson G
Elliott B
Publication year
Publication venue
Authorea Preprints

External Links

Snippet

Ransomware continues to pose one of the most severe cybersecurity challenges, particularly in enterprise environments that rely on Active Directory Domain Services (AD DS) for managing network resources and permissions. The detection of ransomware in AD …
Continue reading at www.authorea.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis

Similar Documents

Publication Publication Date Title
Keyogeg et al. Automated detection of ransomware in windows active directory domain services using log analysis and machine learning
Mirsky et al. The threat of offensive ai to organizations
Kaur et al. A survey on zero-day polymorphic worm detection techniques
Loco et al. Adaptive behavior-based ransomware detection via dynamic flow signatures
Alzonem et al. Ransomware detection using convolutional neural networks and isolation forests in network traffic patterns
Omar Machine learning for cybersecurity: Innovative deep learning solutions
Viddiu et al. Automated ransomware detection using windows file system activity monitoring and a novel machine learning approach
Eisenwer et al. Automated detection of ransomware using dynamic code sequence mapping
Alqahtani et al. A proposed crypto-ransomware early detection (CRED) model using an integrated deep learning and vector space model approach
Park et al. Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks
LaRocque et al. Effective ransomware detection using autonomous patternbased signature extraction
Limer et al. Automated ransomware detection using dynamic behavior trace profiling
Tidjon et al. Threat assessment in machine learning based systems
Zakaria et al. Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection
Thomas Machine Learning Applications for Cybersecurity
Diavka et al. Comprehensive ransomware detection using dynamic behavior profiling
Rani et al. Analysis of machine learning and deep learning intrusion detection system in Internet of Things network
Muggler et al. Cybersecurity management through logging analytics
Adelusola Enhancing Cybersecurity with Machine Learning Techniques: A Comprehensive Approach to Threat Detection and Risk Mitigation
Sandler et al. A new framework for ransomware detection using dynamic encryption pattern analysis
Petersen Detecting network intrusions
Risban et al. Dynamic crypto-behavioral profiling for autonomous ransomware detection
Taj A Machine Learning Framework for Host Based Intrusion Detection using System Call Abstraction
Sarath et al. Malware Forensics Analysis and Detection in Cyber Physical Systems
Tyagi et al. Artificial Intelligence for Malware Analysis: A Systematic Study