Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

KRDroid: Ransomware-Oriented Detector for Mobile Devices Based on Behaviors

View through CrossRef
Ransomware has become a serious threat on Android and new cases of ransomware are continuously growing. Most existing ransomware detectors use sensitive text or APIs to detect ransomware. Some goodware applications with the functionalities of locking screen and encrypting files have similar behaviors with ransomware. It is difficult for ransomware detectors to identity them. In this paper, we made detailed analyses of three kinds of active ransomware. We proposed a behavior-based ransomware detector on Android, called KRDroid. KRDroid deploys on servers or PCs, that is, ransomware cannot be activated and cause any loss during testing. Experiments showed that our ransomware-oriented detector can find 1809 of 1862 unseen ransomware. It can also distinguish goodware with similar ransom behaviors to ransomware with an accuracy of 97.5%.
Title: KRDroid: Ransomware-Oriented Detector for Mobile Devices Based on Behaviors
Description:
Ransomware has become a serious threat on Android and new cases of ransomware are continuously growing.
Most existing ransomware detectors use sensitive text or APIs to detect ransomware.
Some goodware applications with the functionalities of locking screen and encrypting files have similar behaviors with ransomware.
It is difficult for ransomware detectors to identity them.
In this paper, we made detailed analyses of three kinds of active ransomware.
We proposed a behavior-based ransomware detector on Android, called KRDroid.
KRDroid deploys on servers or PCs, that is, ransomware cannot be activated and cause any loss during testing.
Experiments showed that our ransomware-oriented detector can find 1809 of 1862 unseen ransomware.
It can also distinguish goodware with similar ransom behaviors to ransomware with an accuracy of 97.
5%.

Related Results

Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats. Antivirus software is frequently ineffective against zero-day malware and ransomware att...
Ransomware Classification with Deep Neural Network and Bi-LSTM
Ransomware Classification with Deep Neural Network and Bi-LSTM
Malicious attacks, malware, and ransomware families present essential risks to cybersecurity and may result in significant harm to computer systems, data clusters, networks, and mo...
Characterization of a novel HgCdTe focal plane array for ground and space astronomy through innovative infrared setups
Characterization of a novel HgCdTe focal plane array for ground and space astronomy through innovative infrared setups
(English) Nowadays, mercury-cadmium-telluride (MCT) short-wave infrared (SWIR) detectors are widely used in cutting-edge space missions and ground-based telescopes. They take adva...
Conceptual design report of the MPD Cosmic Ray Detector (MCORD)
Conceptual design report of the MPD Cosmic Ray Detector (MCORD)
Abstract This report presents a concept of constructing a detector dedicated for detection of muons observed during measurements carried out at the MPD (Multi-Pu...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Effects of Ransomware: Analysis, Challenges and Future Perspective
Effects of Ransomware: Analysis, Challenges and Future Perspective
This review paper highlights the challenges and best practices in malware analysis, specifically focusing on the age of ransomware. It provides an overview of malware and its impac...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices
Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices
Ransomware remains one of the most destructive forms of cyberattacks, increasingly targeting mobile, IoT, and embedded systems with limited computational capabilities. Traditional ...

Back to Top