Skip to main content

Showing 1–5 of 5 results for author: Vehabovic, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.07760  [pdf, other

    cs.CR

    Ransomware Detection Using Federated Learning with Imbalanced Datasets

    Authors: Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, S. Uluagac, M. Rahouti, E. Bou-Harb, M. Safaei Pour

    Abstract: Ransomware is a type of malware which encrypts user data and extorts payments in return for the decryption keys. This cyberthreat is one of the most serious challenges facing organizations today and has already caused immense financial damage. As a result, many researchers have been developing techniques to counter ransomware. Recently, the federated learning (FL) approach has also been applied fo… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 6 pages, 4 figures, 3 tables

  2. arXiv:2306.14090  [pdf, other

    cs.CR

    Federated Learning Approach for Distributed Ransomware Analysis

    Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno

    Abstract: Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions to tackle the latest threats, many of which may have relatively fewer samples to analyze. This paper presents a machine learning (ML) framework for early ransom… ▽ More

    Submitted 24 June, 2023; originally announced June 2023.

    Comments: 8 figures, 4 tables

  3. IoT Threat Detection Testbed Using Generative Adversarial Networks

    Authors: Farooq Shaikh, Elias Bou-Harb, Aldin Vehabovic, Jorge Crichigno, Aysegul Yayimli, Nasir Ghani

    Abstract: The Internet of Things(IoT) paradigm provides persistent sensing and data collection capabilities and is becoming increasingly prevalent across many market sectors. However, most IoT devices emphasize usability and function over security, making them very vulnerable to malicious exploits. This concern is evidenced by the increased use of compromised IoT devices in large scale bot networks (botnets… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 8 pages, 5 figures

  4. Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution

    Authors: Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno

    Abstract: Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions to tackle the latest threats, many of which may have relatively fewer samples to analyze. This paper presents a machine learning(ML) framework for early ransomw… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 6 pages, 5 figures

  5. Ransomware Detection and Classification Strategies

    Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli

    Abstract: Ransomware uses encryption methods to make data inaccessible to legitimate users. To date a wide range of ransomware families have been developed and deployed, causing immense damage to governments, corporations, and private users. As these cyberthreats multiply, researchers have proposed a range of ransomware detection and classification schemes. Most of these methods use advanced machine learnin… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: 9 pages, 2 figures