• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

加密勒索软件攻击检测方法综述:不断发展的前景。

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.

机构信息

Department of Computer Science, University of Idaho, Moscow, ID 83843, USA.

Department of Computer Science, Najran University, Najran 61441, Saudi Arabia.

出版信息

Sensors (Basel). 2022 Feb 25;22(5):1837. doi: 10.3390/s22051837.

DOI:10.3390/s22051837
PMID:35270983
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8914995/
Abstract

Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems. Due to its unique characteristics, ransomware has attracted the attention of security professionals and researchers toward achieving safer and higher assurance systems that can effectively detect and prevent such attacks. The state-of-the-art crypto ransomware early detection models rely on specific data acquired during the runtime of an attack's lifecycle. However, the evasive mechanisms that these attacks employ to avoid detection often nullify the solutions that are currently in place. More effort is needed to keep up with an attacks' momentum to take the current security defenses to the next level. This survey is devoted to exploring and analyzing the state-of-the-art in ransomware attack detection toward facilitating the research community that endeavors to disrupt this very critical and escalating ransomware problem. The focus is on crypto ransomware as the most prevalent, destructive, and challenging variation. The approaches and open issues pertaining to ransomware detection modeling are reviewed to establish recommendations for future research directions and scope.

摘要

最近,勒索软件攻击是针对全球范围内的广大互联网和移动用户,尤其是关键的网络物理系统的主要威胁之一。由于其独特的特点,勒索软件已经引起了安全专业人员和研究人员的关注,他们希望开发更安全、更有保障的系统,能够有效检测和预防此类攻击。最先进的加密勒索软件早期检测模型依赖于在攻击生命周期的运行时获取的特定数据。然而,这些攻击采用的逃避检测的机制往往会使当前的解决方案失效。需要付出更多的努力来跟上攻击的势头,将当前的安全防御提升到一个新的水平。本调查致力于探索和分析勒索软件攻击检测的最新技术,为努力解决这一非常关键和不断升级的勒索软件问题的研究界提供便利。重点是加密勒索软件,因为它是最普遍、最具破坏性和最具挑战性的变种。审查了与勒索软件检测建模相关的方法和未解决的问题,以为未来的研究方向和范围建立建议。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e84b/8914995/49074cd344de/sensors-22-01837-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e84b/8914995/75efab8cf72d/sensors-22-01837-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e84b/8914995/49074cd344de/sensors-22-01837-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e84b/8914995/75efab8cf72d/sensors-22-01837-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e84b/8914995/49074cd344de/sensors-22-01837-g002.jpg

相似文献

1
A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.加密勒索软件攻击检测方法综述:不断发展的前景。
Sensors (Basel). 2022 Feb 25;22(5):1837. doi: 10.3390/s22051837.
2
Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.时间数据相关性提供增强的动态加密勒索软件预加密边界划定。
Sensors (Basel). 2023 Apr 28;23(9):4355. doi: 10.3390/s23094355.
3
Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.基于流量分析的监督式机器学习技术在安卓勒索软件检测中的应用
Sensors (Basel). 2023 Dec 28;24(1):189. doi: 10.3390/s24010189.
4
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.E2E-RDS:基于静态 ML 和基于视觉的 DL 方法的高效端到端勒索软件检测系统。
Sensors (Basel). 2023 May 4;23(9):4467. doi: 10.3390/s23094467.
5
Ransomware: Analysing the Impact on Windows Active Directory Domain Services.勒索软件:分析对 Windows 活动目录域服务的影响。
Sensors (Basel). 2022 Jan 26;22(3):953. doi: 10.3390/s22030953.
6
An Effective Self-Configurable Ransomware Prevention Technique for IoMT.一种用于 IoMT 的有效自配置勒索软件预防技术。
Sensors (Basel). 2022 Nov 4;22(21):8516. doi: 10.3390/s22218516.
7
Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier.使用基于深度学习的无监督特征提取和成本敏感 Pareto 集成分类器进行勒索软件检测。
Sci Rep. 2022 Sep 19;12(1):15647. doi: 10.1038/s41598-022-19443-7.
8
MIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance.MIFS:一种归一化双曲勒索软件威慑模型,具有更高的准确性和整体性能。
Sensors (Basel). 2024 Mar 7;24(6):1728. doi: 10.3390/s24061728.
9
A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.一种预防、减轻和从勒索软件攻击中恢复的社会技术方法。
Appl Clin Inform. 2016 Jun 29;7(2):624-32. doi: 10.4338/ACI-2016-04-SOA-0064. eCollection 2016.
10
Combatting ransomware in ZephyrOS-activated industrial IoT environments.在ZephyrOS激活的工业物联网环境中对抗勒索软件
Heliyon. 2024 Apr 22;10(9):e29917. doi: 10.1016/j.heliyon.2024.e29917. eCollection 2024 May 15.

引用本文的文献

1
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms.使用WGAN-GP和遗传算法优化抗侧信道攻击的加密协议。
Sci Rep. 2025 Jan 16;15(1):2130. doi: 10.1038/s41598-025-86118-4.
2
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection.革新安全信息与事件管理(SIEM)安全:一种用于多层攻击检测的创新关联引擎设计。
Sensors (Basel). 2024 Jul 28;24(15):4901. doi: 10.3390/s24154901.
3
MIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance.

本文引用的文献

1
Using mutual information for selecting features in supervised neural net learning.在监督式神经网络学习中使用互信息来选择特征。
IEEE Trans Neural Netw. 1994;5(4):537-50. doi: 10.1109/72.298224.
2
An ensemble-based incremental learning approach to data fusion.一种基于集成的增量学习数据融合方法。
IEEE Trans Syst Man Cybern B Cybern. 2007 Apr;37(2):437-50. doi: 10.1109/tsmcb.2006.883873.
3
Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy.基于互信息的特征选择:最大依赖、最大相关和最小冗余准则。
MIFS:一种归一化双曲勒索软件威慑模型,具有更高的准确性和整体性能。
Sensors (Basel). 2024 Mar 7;24(6):1728. doi: 10.3390/s24061728.
4
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.勒索软件中的熵共享:绕过基于熵的加密操作检测
Sensors (Basel). 2024 Feb 23;24(5):1446. doi: 10.3390/s24051446.
5
Plant and Salamander Inspired Network Attack Detection and Data Recovery Model.植物和蝾螈启发的网络攻击检测和数据恢复模型。
Sensors (Basel). 2023 Jun 14;23(12):5562. doi: 10.3390/s23125562.
6
An Effective Self-Configurable Ransomware Prevention Technique for IoMT.一种用于 IoMT 的有效自配置勒索软件预防技术。
Sensors (Basel). 2022 Nov 4;22(21):8516. doi: 10.3390/s22218516.
IEEE Trans Pattern Anal Mach Intell. 2005 Aug;27(8):1226-38. doi: 10.1109/TPAMI.2005.159.