Please use this identifier to cite or link to this item:
https://elib.vku.udn.vn/handle/123456789/2749
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Le, Tran Duc | - |
dc.contributor.author | Le, Ba Luong | - |
dc.contributor.author | Dinh, Truong Duy | - |
dc.contributor.author | Pham, Van Dai | - |
dc.date.accessioned | 2023-09-26T02:30:04Z | - |
dc.date.available | 2023-09-26T02:30:04Z | - |
dc.date.issued | 2023-07 | - |
dc.identifier.isbn | 978-3-031-36886-8 | - |
dc.identifier.uri | https://link.springer.com/chapter/10.1007/978-3-031-36886-8_4 | - |
dc.identifier.uri | http://elib.vku.udn.vn/handle/123456789/2749 | - |
dc.description | Lecture Notes in Networks and Systems (LNNS, volume 734); CITA: Conference on Information Technology and its Applications; pp: 37-49. | vi_VN |
dc.description.abstract | The primary objective of this research is to propose a novel method for analyzing malware through the utilization of hashing techniques. The proposed approach integrates the use of Import Hash, Fuzzy Hash, and Section Level Fuzzy Hash (SLFH) to create a highly optimized, efficient, and accurate technique to classify ransomware families. To test the proposed methodology, we collected a comprehensive dataset from reputable sources and manually labelled each sample to augment the reliability and precision of our analysis. During the development of the proposed methodology, we introduced new steps and conditions to identify ransomware families, resulting in the highest performance level. The major contributions of this research include the combination of various hashing techniques and the proposal of a hash comparison strategy that facilitates the comparison of section hashes between ransomware and the pre-build database. | vi_VN |
dc.language.iso | en | vi_VN |
dc.publisher | Springer Nature | vi_VN |
dc.subject | Ransomware | vi_VN |
dc.subject | Import Hash | vi_VN |
dc.subject | Fuzzy Hash | vi_VN |
dc.subject | File Level Section Hashing | vi_VN |
dc.title | Classification of Ransomware Families Based on Hashing Techniques | vi_VN |
dc.type | Working Paper | vi_VN |
Appears in Collections: | CITA 2023 (International) |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.