
Research Square (Research Square), Год журнала: 2024, Номер unknown
Опубликована: Ноя. 25, 2024
Язык: Английский
Research Square (Research Square), Год журнала: 2024, Номер unknown
Опубликована: Ноя. 25, 2024
Язык: Английский
Authorea (Authorea), Год журнала: 2024, Номер unknown
Опубликована: Июль 25, 2024
Ransomware continues to pose a significant threat cybersecurity, causing extensive damage through the encryption of critical data and subsequent ransom demands. Introducing novel dual-layer random forest approach enhances ransomware detection by leveraging hierarchical analysis opcode sequences, providing superior accuracy robustness compared traditional models. The proposed methodology involves an initial layer that captures general distribution patterns, followed refined second focuses on most discriminative features identified advanced feature engineering techniques such as n-gram models TF-IDF transformations. Extensive evaluations demonstrate model's effectiveness across various performance metrics, including accuracy, precision, recall, F1-score, significantly outperforming single-layer forests, support vector machines, neural networks. nature model mitigates overfitting ensures scalability, making it well-suited for real-world scenarios. Additionally, detailed importance provides valuable insights into distinguishing characteristics ransomware, facilitating development targeted cybersecurity strategies. represents advancement in malware detection, demonstrating potential machine learning address complex challenges with high reliability.
Язык: Английский
Процитировано
10Опубликована: Авг. 13, 2024
The rise of ransomware as a predominant cybersecurity threat has necessitated the development innovative detection mechanisms capable adapting to rapidly evolving nature such attacks. In response this challenge, federated learning, combined with Recurrent Neural Networks (RNNs), offers novel approach that preserves data privacy while maintaining high accuracy. research presented explores implementation learning framework, where RNN models are trained across decentralized datasets without sharing sensitive data, ensuring compliance regulations. Through comprehensive experiments, study demonstrates model achieves comparable performance centralized models, added benefit enhanced security. results demonstrate potential scalable and robust solution for applications, particularly in environments confidentiality is paramount. findings further highlight broader implications adopting techniques privacy-preserving machine paving way future advancements secure effective detection.
Язык: Английский
Процитировано
4Fluid Phase Equilibria, Год журнала: 2025, Номер unknown, С. 114423 - 114423
Опубликована: Март 1, 2025
Язык: Английский
Процитировано
0Alexandria Engineering Journal, Год журнала: 2025, Номер 124, С. 550 - 564
Опубликована: Апрель 11, 2025
Язык: Английский
Процитировано
0European Journal of Artificial Intelligence and Machine Learning, Год журнала: 2025, Номер 4(3), С. 1 - 7
Опубликована: Май 16, 2025
Ransomware is a new cybersecurity attack with huge financial and operational impact in industries globally. In this paper, an investigation of utilizing machine learning algorithms for ransomware detection performed compared conventional methods, which consistently fall prey to dynamically altering attacks. Various algorithms, such as Support Vector Machines, Random Forest, Gradient Boosting, Artificial Neural Networks, Logistic Regression ensemble have been evaluated, method Boosting proving validation accuracy 100% Forest showing 99.99% Recall. These findings validate the viability both known unknown forms detection, current work opens avenues developing sophisticated, adaptive anti-ransomware frameworks.
Язык: Английский
Процитировано
0Symmetry, Год журнала: 2025, Номер 17(6), С. 859 - 859
Опубликована: Июнь 1, 2025
Cloud security automation has emerged as a critical solution for organizations facing increasingly complex cybersecurity challenges in cloud environments. This study examines the current state of automation, focusing on its role symmetry between threat detection and response capabilities. Through analysis recent market trends technological developments, this paper explores key technologies, including Security Information Event Management (SIEM), Extended Detection Response (XDR), Orchestration, Automation, (SOAR) platforms. The integration artificial intelligence machine learning transformed these systems, enabling real-time automated mechanisms. research real-world applications highlights that implementing solutions have demonstrated improved incident times reduced breaches. However, remain terms complexity human expertise. As global AI is projected to reach $134 billion by 2030, future lies advanced AI-driven integration. Even though platforms are widely used, existing tools identifying threats, heterogeneous data sources, actionable generation. majority not designed cloud-native do scale or evolve. overcomes introducing scalable extensible architecture, which uses sophisticated correlation provide increased accuracies well challenging environment cloud-based infrastructures. aims equip with proven methods from use cases strategies they can adopt enable response.
Язык: Английский
Процитировано
0Research Square (Research Square), Год журнала: 2024, Номер unknown
Опубликована: Авг. 13, 2024
Язык: Английский
Процитировано
2Research Square (Research Square), Год журнала: 2024, Номер unknown
Опубликована: Ноя. 27, 2024
Язык: Английский
Процитировано
0Research Square (Research Square), Год журнала: 2024, Номер unknown
Опубликована: Ноя. 15, 2024
Язык: Английский
Процитировано
0Research Square (Research Square), Год журнала: 2024, Номер unknown
Опубликована: Ноя. 25, 2024
Язык: Английский
Процитировано
0