Acknowledgement
This work was supported by 2023 Hannam University Research Fund.
References
- Mos, M. A., & Chowdhury, M. M. (2020, July). The growing influence of ransomware. In 2020 IEEE International Conference on Electro Information Technology (EIT) (pp. 643-647). IEEE. DOI : 10.1109/EIT48999.2020.9208254
- Y. C. Hwang. (2022). Extraction and classification of malicious code feature information for intelligent detection model. Industrial Convergence Research (formerly Journal of the Korean Society of Industrial Management), 20(5), 61-68. DOI : 10.22678/JIC.2022.20.5.061
- K. W. Moon, J. H. Lee. (2022). Recent Ransomware Trends and Development Direction. Journal of Information Security Society, 32(3), 33-39.
- Kok, S., Abdullah, A.,Jhanjhi,N.,& Supramaniam, M. (2019). Ransomware, threat and detection techniques: A review. Int. J. Comput. Sci. Netw. Secur, 19(2), 136.
- H. S. Kim,, & S. J. Lee. (2023). Comparative analysis of effective feature extraction techniques for machine learning-based ransomware attack detection. Convergence Security Thesis, 23(1), 117-123.
- Wan, Y. L., Chang, J. C., Chen, R. J., & Wang, S. J. (2018, April). Feature-selection-based ransomware detection with machine learning of data analysis. In 2018 3rd international conference on computer and communication systems (ICCCS) (pp. 85-88). IEEE. DOI : 10.1109/CCOMS.2018.8463300
- H. G. Lee, J. H. Sung, Y. C. Kim, J. B. Kim, & K. Y. Kim. (2017). A study on ransomware analysis and detection pattern automation model. Journal of the Korea Institute of Information & Communication Engineering, 21(8).
- H. G. Kim, D. H. Jeong, P. K.. Jin, C. M. Han, & G. B. Kim. (2017). $ UsnJrnl Based ransomware encryption pattern typology and detection model. Digital forensic research, 11(3), 71-80.
- Berrueta, E., Morato, D., Magana, E., & Izal, M. (2019). A survey on detection techniques for cryptographic ransomware. IEEE Access, 7, 144925-144944. DOI : 10.1109/ACCESS.2019.2945839
- Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Prevention of cryptoransomware using a pre-encryption detection algorithm. Computers, 8(4), 79. DOI : 10.3390/computers8040079
- Gonzalez, D., & Hayajneh, T. (2017, October). Detection and prevention of crypto-ransomware. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 472-478). IEEE. DOI : 10.1109/UEMCON.2017.8249052
- Usharani, S., Bala, P. M., & Mary, M. M. J. (2021). Dynamic analysis on crypto-ransomware by using machine learning: Gandcrab ransomware. In Journal of Physics: Conference Series (Vol. 1717, No. 1, p. 012024). IOP Publishing. DOI : 10.1088/1742-6596/1717/1/012024
- Y. S. Lee, H. J. Choi, D. M. Shin, & J. J. Lee, (2019). Evaluation of User Abnormal Behavior Detection Performance Based on Deep Learning for Ransomware Prevention. Journal of the Korea Software Appraisal Society, 15(2), 43-50.
- Y. C. Hwang. (2023). Extraction and Taxonomy of ransomware features for proactive detection and prevention. Industrial Convergence Research (formerly Journal of the Korean Society of Industrial Management), 21(9), 61-68. DOI : 10.22678/JIC.2023.21.9.041
- Juba, B., & Le, H. S. (2019, July). Precisionrecall versus accuracy and the role of large data sets. In Proceedings of the AAAI conference on artificial intelligence (Vol. 33, No. 01, pp. 4039- 4048). DOI : 10.1609/aaai.v33i01.33014039
- Powers, D. M. (2020). Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. arXiv preprint arXiv:2010.16061.