Hermes Ransomware v2.1 Action Monitoring using Next Generation Security Operation Center (NGSOC) Complex Correlation Rules
Abstract
Keywords
Full Text:
PDFReferences
GData blog, “Malware trends 2017,” 2018. .
Gartner, “Rethink Your Security & Risk Strategy with 2021 Cybersecurity Frameworks and Best Practices,” 2021. .
S. Abijah Roseline and S. Geetha, “A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks,” Comput. Electr. Eng., vol. 92, no. May, p. 107143, 2021, doi: 10.1016/j.compeleceng.2021.107143.
S. R. T. Mat, M. F. Ab Razak, M. N. M. Kahar, J. M. Arif, S. Mohamad, and A. Firdaus, “Towards a systematic description of the field using bibliometric analysis: malware evolution,” Scientometrics, vol. 126, no. 3, pp. 2013–2055, 2021, doi: 10.1007/s11192-020-03834-6.
H. Hanif, M. H. N. Md Nasir, M. F. Ab Razak, A. Firdaus, and N. B. Anuar, “The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches,” J. Netw. Comput. Appl., vol. 179, no. February, p. 103009, 2021, doi: 10.1016/j.jnca.2021.103009.
Y. T. Dun, M. F. A. Razak, M. F. Zolkipli, T. F. Bee, and A. Firdaus, “Grasp on next generation security operation centre (NGSOC): Comparative study,” Int. J. Nonlinear Anal. Appl., vol. 12, no. 2, pp. 869–895, 2021, doi: 10.22075/ijnaa.2021.5145.
S. R. T. Mat, M. F. A. Razak, M. N. M. Kahar, J. M. Arif, and A. Firdaus, “A Bayesian probability model for Android malware detection Sharfah,” ICT Express, pp. 1–12, 2021, doi: 10.1016/j.icte.2021.09.003.
S. R. T. Mat, M. F. A. Razak, M. N. M. Kahar, J. M. Arif, S. Mohamad, and A. Firdaus, “Towards a systematic description of the field using bibliometric analysis: malware evolution,” J. Sci., pp. 1–38, 2021.
M. F. J. Klaib, M. R. A. Sara, and M. Hasan, “D-GREEDY: Greedy shortest superstring with delayed random choice,” Int. J. Softw. Eng. Comput. Syst., vol. 6, no. 1, pp. 8–17, 2020.
W. Z. A. Zakaria, M. F. Abdollah, O. Mohd, and A. F. M. Ariffin, “The rise of ransomware,” ACM Int. Conf. Proceeding Ser., no. May, pp. 66–70, 2017, doi: 10.1145/3178212.3178224.
R. Jusoh, A. Firdaus, S. Anwar, M. Z. Osman, M. F. Darmawan, and M. F. Ab Razak, “Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation),” PeerJ Comput. Sci., vol. 7, no. e522, pp. 1–54, 2021, doi: 10.7717/peerj-cs.522.
A. Alabdulatif, H. Kumarage, I. Khalil, and X. Yi, “Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption,” J. Comput. Syst. Sci., vol. 90, no. May, pp. 28–45, 2017, doi: 10.1016/j.jcss.2017.03.001.
T. Dargahi, A. Dehghantanha, P. N. Bahrami, M. Conti, G. Bianchi, and L. Benedetto, “A Cyber-Kill-Chain based taxonomy of crypto-ransomware features,” J. Comput. Virol. Hacking Tech., vol. 15, no. 4, pp. 277–305, 2019, doi: 10.1007/s11416-019-00338-7.
M. Vielberth, F. Bohm, I. Fichtinger, and G. Pernul, “Security Operations Center: A Systematic Study and Open Challenges,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3045514.
P. Danquah, “Security Operations Center: A Framework for Automated Triage, Containment and Escalation,” J. Inf. Secur., vol. 11, no. 04, pp. 225–240, 2020, doi: 10.4236/jis.2020.114015.
E. Agyepong, Y. Cherdantseva, P. Reinecke, and P. Burnap, “Towards a Framework for Measuring the Performance of a Security Operations Center Analyst,” Int. Conf. Cyber Secur. Prot. Digit. Serv. Cyber Secur. 2020, 2020, doi: 10.1109/CyberSecurity49315.2020.9138872.
O. V. Lee et al., “A malicious URLs detection system using optimization and machine learning classifiers,” Indones. J. Electr. Eng. Comput. Sci., vol. 17, no. 3, pp. 1210–1214, 2020, doi: 10.11591/ijeecs.v17.i3.pp1210-1214.
W. P. Aung, H. H. Lwin, and K. K. Lin, “Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar,” 2020 IEEE Conf. Comput. Appl. ICCA 2020, pp. 1–6, 2020, doi: 10.1109/ICCA49400.2020.9022821.
N. N. M. Nasri, M. F. A. Razak, R. D. R. Saedudin, S. Mohamad-Asmara, and A. Firdaus, “Android malware detection system using machine learning,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 9, no. 1 Special Issue 5, pp. 327–333, 2020, doi: 10.30534/ijatcse/2020/4691.52020.
B. Bouyeddou, F. Harrou, B. Kadri, and Y. Sun, “Detecting network cyber-attacks using an integrated statistical approach,” Cluster Comput., vol. 24, no. 2, pp. 1435–1453, 2021, doi: 10.1007/s10586-020-03203-1.
N. Miloslavskaya and S. Furnell, “Network Security Intelligence Centres for Information Security Incident Management,” Adv. Intell. Syst. Comput., vol. 1310, no. May, pp. 270–282, 2021, doi: 10.1007/978-3-030-65596-9_34.
R. Malkawe, M. Qasaimeh, F. Ghanim, and M. Ababneh, “Toward an early assessment for ransomware attack vulnerabilities,” ACM Int. Conf. Proceeding Ser., no. May, p. 3368734, 2019, doi: 10.1145/3368691.3368734.
Infoblox, “Hermes Ransomware Cyber Report,” Pp 1-3, no. February 2017, pp. 2017–2019, 2017.
J. ho Hwang, J. Kwak, and T. jin Lee, “Fast k-NN based Malware Analysis in a Massive Malware Environment,” KSII Trans. Internet Inf. Syst., vol. 13, no. 12, pp. 6145–6158, 2019, doi: 10.3837/tiis.2019.12.019.
M. Vielberth, F. Bohm, I. Fichtinger, and G. Pernul, “Security Operations Center: A Systematic Study and Open Challenges,” IEEE Access, no. May, p. 3045514, 2020, doi: 10.1109/ACCESS.2020.3045514.
M. H. Khyavi, “ISMS role in the improvement of digital forensics related process in SOC’s,” Cryptogr. Secur., 2020.
DOI: http://dx.doi.org/10.18517/ijaseit.12.3.15329
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development