{"id":"https://openalex.org/W3085550466","doi":"https://doi.org/10.1109/iri49571.2020.00053","title":"An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network","display_name":"An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3085550466","doi":"https://doi.org/10.1109/iri49571.2020.00053","mag":"3085550466"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri49571.2020.00053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.utwente.nl/files/250902648/Ayub_2020_An_i_o_request_packet_irp_driven_ef.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002099869","display_name":"Md. Ahsan Ayub","orcid":"https://orcid.org/0000-0002-1345-0110"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"funder","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md. Ahsan Ayub","raw_affiliation_strings":["Department of Computer Science, Tennessee Tech University, Cookeville, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee Tech University, Cookeville, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071672404","display_name":"Andrea Continella","orcid":"https://orcid.org/0000-0002-0329-1830"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"funder","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Andrea Continella","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, NL"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, NL","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110313478","display_name":"Ambareen Siraj","orcid":null},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"funder","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ambareen Siraj","raw_affiliation_strings":["Department of Computer Science, Tennessee Tech University, Cookeville, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tennessee Tech University, Cookeville, USA","institution_ids":["https://openalex.org/I63920570"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.848,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":17,"citation_normalized_percentile":{"value":0.715564,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":null,"issue":null,"first_page":"319","last_page":"324"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9938,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.97520137}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.97520137},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65845156},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5965013},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.44634813},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43287915},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43130603},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3414028},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.32987708}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri49571.2020.00053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/13de8e35-13b9-4a4e-8eb0-2faec1c49bc5","pdf_url":"https://research.utwente.nl/files/250902648/Ayub_2020_An_i_o_request_packet_irp_driven_ef.pdf","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://ris.utwente.nl/ws/files/250902648/Ayub_2020_An_i_o_request_packet_irp_driven_ef.pdf","pdf_url":"https://ris.utwente.nl/ws/files/250902648/Ayub_2020_An_i_o_request_packet_irp_driven_ef.pdf","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/13de8e35-13b9-4a4e-8eb0-2faec1c49bc5","pdf_url":"https://research.utwente.nl/files/250902648/Ayub_2020_An_i_o_request_packet_irp_driven_ef.pdf","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.64,"id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W2060145807","https://openalex.org/W2085807744","https://openalex.org/W2119359024","https://openalex.org/W2129860818","https://openalex.org/W2461373307","https://openalex.org/W2514847810","https://openalex.org/W2550109527","https://openalex.org/W2559964890","https://openalex.org/W276524486","https://openalex.org/W2783741806","https://openalex.org/W2890196927","https://openalex.org/W2901561143","https://openalex.org/W2993999308","https://openalex.org/W4248806346","https://openalex.org/W4293742266"],"related_works":["https://openalex.org/W4389157351","https://openalex.org/W4380791770","https://openalex.org/W4253977752","https://openalex.org/W4232561318","https://openalex.org/W3201228709","https://openalex.org/W3120595989","https://openalex.org/W2964829536","https://openalex.org/W2942879794","https://openalex.org/W2922354075","https://openalex.org/W2904586340"],"abstract_inverted_index":{"In":[0],"recent":[1],"times,":[2],"there":[3],"has":[4],"been":[5,58],"a":[6,73,80],"global":[7],"surge":[8],"of":[9,15,33,67,105,113,149,167,177,193],"ransomware":[10,34,41,88,106,115,121,142],"attacks":[11],"targeted":[12],"at":[13],"industries":[14],"various":[16],"types":[17],"and":[18,38,53,183],"sizes":[19],"from":[20],"retail":[21],"to":[22,62,99,118,163],"critical":[23],"infrastructure.":[24],"Ransomware":[25],"researchers":[26,56],"are":[27],"constantly":[28],"coming":[29],"across":[30],"new":[31],"kinds":[32],"samples":[35,116],"every":[36],"day":[37],"discovering":[39],"novel":[40],"families":[42,122],"out":[43],"in":[44,96,175,190],"the":[45,110,146,150,155,165,191],"wild.":[46],"To":[47],"mitigate":[48],"this":[49,65,97],"ever-growing":[50],"menace,":[51],"academia":[52],"industry-based":[54],"security":[55],"have":[57],"utilizing":[59],"unique":[60],"ways":[61],"defend":[63],"against":[64,87],"type":[66],"cyber-attacks.":[68],"I/O":[69,77],"Request":[70],"Packet":[71],"(IRP),":[72],"low-level":[74],"file":[75],"system":[76],"log,":[78],"is":[79,90],"newly":[81],"found":[82],"research":[83],"paradigm":[84],"for":[85,140],"defense":[86],"that":[89],"being":[91],"explored":[92],"frequently.":[93],"As":[94],"such":[95],"study,":[98],"learn":[100],"granular":[101],"level,":[102],"actionable":[103],"insights":[104],"behavior,":[107],"we":[108],"analyze":[109],"IRP":[111,151],"logs":[112],"272":[114],"belonging":[117],"18":[119],"different":[120,160],"captured":[123],"during":[124],"individual":[125],"execution.":[126],"We":[127,153],"further":[128],"our":[129,168],"analysis":[130],"by":[131,144],"building":[132],"an":[133],"effective":[134],"Artificial":[135],"Neural":[136],"Network":[137],"(ANN)":[138],"structure":[139],"successful":[141],"detection":[143],"learning":[145],"underlying":[147],"patterns":[148],"logs.":[152],"evaluate":[154],"ANN":[156],"model":[157,171],"with":[158],"three":[159],"experimental":[161],"settings":[162],"prove":[164],"effectiveness":[166],"approach.":[169],"The":[170],"demonstrates":[172],"outstanding":[173],"performance":[174],"terms":[176],"accuracy,":[178],"precision":[179],"score,":[180,182,188],"recall":[181],"F":[184],"1":[187],"i.e.,":[189],"range":[192],"99.7%\u00b10.2%.":[194]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3085550466","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5}],"updated_date":"2025-04-24T20:33:35.164684","created_date":"2020-09-21"}