AI-Powered Behavioral Analysis for Early Detection of Ransomware in Cybersecurity Environments DOI
Udit Mamodiya,

K. Ravali,

Srinu Banothu

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 95 - 108

Published: Feb. 7, 2025

Ransomware attacks are one of the most wide-ranging and destructive types threat in modern cybersecurity pose threats to organizations, enterprises, individuals. These traditional signature-based heuristic methods detecting security systems do not discover new polymorphic ransomware variants due their adaptive behavior towards avoiding being detected. In an attempt overcome these limitations, this paper proposes AI-powered behavioral analysis framework for early detection environments. The proposed system uses advanced machine learning deep techniques identify anomalous patterns at various levels system, such as file access, process execution, network activity. It incorporates both a Long Short-Term Memory (LSTM) model sequential data Random Forest (RF) classifier extract features classify ransomware.

Language: Английский

In-Depth Analysis and Countermeasures for Ransomware Attacks: Case Studies and Recommendations DOI Open Access

Yap Jia Seng,

Teo Yue Cen,

Muhammad Amar Hakim bin Mohd Raslan

et al.

Published: Sept. 2, 2024

Ransomware, a combination of "ransom" and "malware," is type malicious software designed to encrypt or block access victim's data system, demanding ransom for its release Initially targeting individuals, ransomware has evolved attack businesses greater financial gain. It mainly exists in two forms: encrypting ransomware, which holds hostage, non-encrypting blocks system displays note. The energy sector been notably targeted by exemplified the 2021 on Colonial Pipeline DarkSide group, led temporary shutdown significant fuel shortage US East Coast. Similarly, 2023, Russian hackers using LockBit disrupted Royal Mail, halting international deliveries incurring millions recovery costs despite no payment. These incidents underscore need comprehensive cybersecurity strategies that combine human vigilance with advanced technologies like AI machine learning. By adopting multi-layered protection approach, organizations can better prepare mitigate risks posed attacks safeguarding sensitive ensuring business continuity.

Language: Английский

Citations

8

AI in Healthcare Safeguarding Patient Privacy and Confidentiality DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 369 - 404

Published: Feb. 14, 2025

In the era of digitization, Artificial Intelligence (AI) integration in healthcare has become a necessity to ensure patient identification & privacy. With rise digitalisation health systems, it also increasingly important have more stringent data protection requirements. This transformation is heavily facilitated by AI-driven technologies that reinforce security, identify real-time threats and streamline compliance with regulations. By utilizing Machine Learning (ML) algorithms comb through big data, outliers can be pinpointed filtered out so unauthorized access prevented assistance advanced forms encryption which protect information while transit or at rest. But fast pace AI development creates as many opportunities challenges, especially when comes marrying availability These ethical concerns, for effective regulatory frameworks, are critical an evolving ecosystem technologies.

Language: Английский

Citations

0

Progress and Obstacles in Cloud Computing for Healthcare DOI

Abu Jor Al Gefari,

Imran Hasan,

Md Amin Ullah Sheikh

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 347 - 368

Published: Feb. 14, 2025

Since the invention of Internet Things (IoT), people are seeing a new world in healthcare. The rapid growth IoT has brought with it solutions to dilemmas and few challenges cloud devices. But keeping mind benefits these devices, need be solved efficiency security. Putting place storage analysis for specific periods is very popular medicine. On other hand, creating big data, considering sensitivity, some limitations have accepted. use latency, throughput, bandwidth increases cost Internet. Numerous alternative paradigms, most notably edge computing fog computing, evolved solve shortcomings. Consequently, studies shown an increase hybrid based.

Language: Английский

Citations

0

Future Trends in AI Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 229 - 262

Published: Feb. 14, 2025

Cybersecurity is enriched due to Artificial Intelligence (AI), which provides better real-time threat detection and anomaly identification, response systems. As attackers grow more sophisticated leverage AI in creating malware. The present study gives an overview of the future threats associated with AI-driven attacks challenges faced by existing cybersecurity countermeasures. Additionally, it also analyses feasibility using capabilities like predictive intelligence, advanced quantum computing for some these emerging threats. For such as, we need user permissions rights on this application, should take into consideration privacy policies while designing security as well. To end, get ready against risks a proactive adaptive approach needed stressing collaboration between industry, academia well global entities.

Language: Английский

Citations

0

Blockchain in Cybersecurity Enhancing Data Integrity and Transaction Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 40

Published: Feb. 14, 2025

The technology is becoming a little more widely known with its data security and hyper-transaction reliability. By very design of decentralization implementation cryptographic principles to maintain integrity, blockchain eliminates central points failure making tampering unauthorized changes virtually impossible as well. This part the diary will discuss how giving our financial transactions, providing safety identities agreements seamless smart contracts. From healthcare supply chain management, it amazing witness many industries are beginning incorporate decree validity information, prevent fraud. But you know what they say — new tech has ways break. ride been accompanied by scalability challenges, energy consumption worries, regulation problems so on. There also some promising prospects, quantum-resistant algorithms enhanced interoperability may resolve these widen blockchain's influence.

Language: Английский

Citations

0

Cybersecurity in IoT Ecosystems Managing Device Vulnerabilities and Data Exposure DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 63 - 98

Published: Feb. 14, 2025

The proliferation of IoT devices and sensors leads to greater efficiency but also greatly increased attack surfaces. In this part the series, we delve into some key security issues that plague ecosystems with a solution- understanding device vulnerabilities how they led data exposure. are frequently built without strong defences in place, lack secure firmware combined weak authentication making them top list for attackers. We will turn real-world threats, such as distributed denial service (DDoS) attacks launched by botnets breaches disclose personal information or sensitive business information. Although chapter certainly warns risks, it is no means doom-and-gloom line reasoning. paper outlines best practices systems, from security-by-design principles leveraging AI blockchain technologies.

Language: Английский

Citations

0

Current Security Issues and Vulnerabilities Associated With Mobile Application DOI

Abdullahi Adewole Zakariyah,

Muhammand Intizar Ali,

Nima Yoezer

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 41 - 62

Published: Feb. 14, 2025

Mobile applications have become a crucial part of modern life, facilitating everything from social interactions to financial transactions. However, this ubiquity also presents significant security challenge. The landscape mobile app is fraught with vulnerabilities and threats that can compromise user data, privacy, the overall integrity applications. This paper delves into issues affect It provides an in-depth analysis various attack methods used by cybercriminals extract data explores how users protect their information being compromised. discussion will cover common tactics employed attackers, potential consequences losing application these threats, critical measures necessary for safeguarding against such attacks.

Language: Английский

Citations

0

AI-Powered Behavioral Analysis for Early Detection of Ransomware in Cybersecurity Environments DOI
Udit Mamodiya,

K. Ravali,

Srinu Banothu

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 95 - 108

Published: Feb. 7, 2025

Ransomware attacks are one of the most wide-ranging and destructive types threat in modern cybersecurity pose threats to organizations, enterprises, individuals. These traditional signature-based heuristic methods detecting security systems do not discover new polymorphic ransomware variants due their adaptive behavior towards avoiding being detected. In an attempt overcome these limitations, this paper proposes AI-powered behavioral analysis framework for early detection environments. The proposed system uses advanced machine learning deep techniques identify anomalous patterns at various levels system, such as file access, process execution, network activity. It incorporates both a Long Short-Term Memory (LSTM) model sequential data Random Forest (RF) classifier extract features classify ransomware.

Language: Английский

Citations

0