• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用不同类型神经网络对勒索软件进行分类。

Classification of ransomware using different types of neural networks.

作者信息

Madani Houria, Ouerdi Noura, Boumesaoud Ahmed, Azizi Abdelmalek

机构信息

Faculty of Sciences, Mohammed First University, Oujda, Morocco.

出版信息

Sci Rep. 2022 Mar 19;12(1):4770. doi: 10.1038/s41598-022-08504-6.

DOI:10.1038/s41598-022-08504-6
PMID:35306523
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8934054/
Abstract

Malware threat the security of computers and Internet. Among the diversity of malware, we have "ransomware". Its main objective is to prevent and block access to user data and computers in exchange for a ransom, once paid, the data will be liberated. Researchers and developers are rushing to find reliable and safe techniques and methods to detect Ransomware to protect the Internet user from such threats. Among the techniques generally used to detect malware are machine learning techniques. In this paper, we will discuss the different types of neural networks, the related work of each type, aiming at the classification of malware in general and ransomware in particular. After this study, we will talk about the adopted methodology for the implementation of our neural network model (multilayer perceptron). We tested this model, firstly, with the binary detection whether it is malware or goodware, and secondly, with the classification of the nine families of Ransomware by taking the vector of our previous work and we will make a comparison of the accuracy rate of the instances that are correctly classified.

摘要

恶意软件威胁计算机和互联网的安全。在恶意软件的多样性中,有一种“勒索软件”。它的主要目的是阻止用户访问数据和计算机,并以此索要赎金,一旦支付赎金,数据将被解锁。研究人员和开发人员正急于寻找可靠且安全的技术和方法来检测勒索软件,以保护互联网用户免受此类威胁。通常用于检测恶意软件的技术之一是机器学习技术。在本文中,我们将讨论不同类型的神经网络及其相关工作,旨在对一般恶意软件尤其是勒索软件进行分类。在这项研究之后,我们将讨论实施我们的神经网络模型(多层感知器)所采用的方法。我们首先使用该模型进行二进制检测,判断其是恶意软件还是良性软件,其次,通过采用我们之前工作的向量对九种勒索软件家族进行分类,并对正确分类实例的准确率进行比较。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/84301b3a7b1a/41598_2022_8504_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/823d9a6c8dc9/41598_2022_8504_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/7475a8897140/41598_2022_8504_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/c16964a87abd/41598_2022_8504_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/3c89df917e08/41598_2022_8504_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/5e98a37ace1c/41598_2022_8504_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/ec635c6bdc0d/41598_2022_8504_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/1961b86cc81a/41598_2022_8504_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/fa8e4b9e5218/41598_2022_8504_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/3ff98cf9f36f/41598_2022_8504_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/8ec652cbe176/41598_2022_8504_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/4ee626cccca8/41598_2022_8504_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/415b4f24392c/41598_2022_8504_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/84301b3a7b1a/41598_2022_8504_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/823d9a6c8dc9/41598_2022_8504_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/7475a8897140/41598_2022_8504_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/c16964a87abd/41598_2022_8504_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/3c89df917e08/41598_2022_8504_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/5e98a37ace1c/41598_2022_8504_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/ec635c6bdc0d/41598_2022_8504_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/1961b86cc81a/41598_2022_8504_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/fa8e4b9e5218/41598_2022_8504_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/3ff98cf9f36f/41598_2022_8504_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/8ec652cbe176/41598_2022_8504_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/4ee626cccca8/41598_2022_8504_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/415b4f24392c/41598_2022_8504_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1365/8934338/84301b3a7b1a/41598_2022_8504_Fig13_HTML.jpg

相似文献

1
Classification of ransomware using different types of neural networks.使用不同类型神经网络对勒索软件进行分类。
Sci Rep. 2022 Mar 19;12(1):4770. doi: 10.1038/s41598-022-08504-6.
2
Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms.使用机器学习算法的勒索软件检测动态特征数据集。
Sensors (Basel). 2023 Jan 17;23(3):1053. doi: 10.3390/s23031053.
3
An Effective Self-Configurable Ransomware Prevention Technique for IoMT.一种用于 IoMT 的有效自配置勒索软件预防技术。
Sensors (Basel). 2022 Nov 4;22(21):8516. doi: 10.3390/s22218516.
4
Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.数字取证在恶意软件分类中的应用:一种从二进制代码到像素向量转换的方法。
Comput Intell Neurosci. 2022 Apr 21;2022:6294058. doi: 10.1155/2022/6294058. eCollection 2022.
5
Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.基于流量分析的监督式机器学习技术在安卓勒索软件检测中的应用
Sensors (Basel). 2023 Dec 28;24(1):189. doi: 10.3390/s24010189.
6
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.E2E-RDS:基于静态 ML 和基于视觉的 DL 方法的高效端到端勒索软件检测系统。
Sensors (Basel). 2023 May 4;23(9):4467. doi: 10.3390/s23094467.
7
Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.基于多尺度特征融合卷积神经网络的恶意代码变体识别。
Comput Intell Neurosci. 2021 Dec 14;2021:1070586. doi: 10.1155/2021/1070586. eCollection 2021.
8
Convolution neural network with batch normalization and inception-residual modules for Android malware classification.基于批量归一化和 Inception-Residual 模块的卷积神经网络用于安卓恶意软件分类。
Sci Rep. 2022 Aug 17;12(1):13996. doi: 10.1038/s41598-022-18402-6.
9
On the classification of Microsoft-Windows ransomware using hardware profile.基于硬件配置文件对微软Windows勒索软件进行分类
PeerJ Comput Sci. 2021 Feb 2;7:e361. doi: 10.7717/peerj-cs.361. eCollection 2021.
10
A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.加密勒索软件攻击检测方法综述:不断发展的前景。
Sensors (Basel). 2022 Feb 25;22(5):1837. doi: 10.3390/s22051837.