{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:26Z","timestamp":1730211686288,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/csnet.2018.8602978","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:10:27Z","timestamp":1546996227000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Ransomware Encrypted Your Files but You Restored Them from Network Traffic"],"prefix":"10.1109","author":[{"given":"Eduardo","family":"Berrueta","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Morato","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Magana","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Izal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Network Tracing","year":"0","key":"ref33"},{"journal-title":"Libnids","year":"0","author":"wojtczuk","key":"ref32"},{"journal-title":"Tcpfiow-a tcp ip session reassembler","year":"0","key":"ref31"},{"journal-title":"RAPPER Ransomware prevention via performance counters","year":"2018","author":"alam","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITECHN.2017.8281835"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989051"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","article-title":"Cutting the gordian knot: A look under the hood of ransomware attacks","author":"kharraz","year":"2015","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-319-66332-6_5","article-title":"Redemption: Real-time protection against ransomware at end-hosts","author":"kharraz","year":"2017","journal-title":"Research in Attacks Intrusions and Defenses"},{"key":"ref17","article-title":"Packet storage at multi-gigabit rates using off-the-shelf systems","author":"victor","year":"2014","journal-title":"2014 IEEE Intl Conf on High Performance Computing and Communications 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC CSS ICESS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264852"},{"journal-title":"Intel data plane development kit","year":"0","key":"ref19"},{"journal-title":"Apple filing protocol concepts Technical report","year":"0","key":"ref28"},{"key":"ref4","first-page":"123","article-title":"Ransomware-exploring the electronic form of extortion","volume":"2","author":"thakkar","year":"2015","journal-title":"International Journal for Scientific Research & Development"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7530"},{"journal-title":"Technical report Europol-European Police Office","article-title":"Internet organised crime thread assessment (IOCTA) 2016","year":"2016","key":"ref3"},{"key":"ref6","first-page":"80","article-title":"Ransomware: Evolution, target and safety measures","volume":"6","author":"mauraya","year":"2017","journal-title":"International Journal of Computational Engineering Science"},{"journal-title":"Ntopng high-speec web-based traffic analysis","year":"0","key":"ref29"},{"key":"ref5","article-title":"Ransomware payments in the bitcoin ecosystem","author":"paquet-clouston","year":"2018","journal-title":"Proceedings of the 17th Annual Workshop on the Economics of Information Security (WEIS)"},{"journal-title":"onQ Ransomware Edition","year":"2017","key":"ref8"},{"journal-title":"Technical report Osterman Research Inc","year":"2016","key":"ref7"},{"journal-title":"Adrien Gendre Ransomware statistics","year":"2017","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SPAC.2017.8304335"},{"journal-title":"Symantec Corporation Technical Report","year":"2016","key":"ref1"},{"journal-title":"Technical report Endace","year":"0","key":"ref20"},{"journal-title":"Chaosreader","year":"0","key":"ref22"},{"journal-title":"http-sniffer","year":"2012","key":"ref21"},{"journal-title":"Common Internet File System (CIFS) protocol","year":"0","key":"ref24"},{"journal-title":"SANS Institute Tech Rep","article-title":"Extracting files from network packet captures","year":"2015","key":"ref23"},{"journal-title":"Nicolas Harbour tcpxtract","year":"0","key":"ref26"},{"journal-title":"Server Message Block (SMB) Protocol Versions 2 and 3","year":"0","key":"ref25"}],"event":{"name":"2018 2nd Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2018,10,24]]},"location":"Paris","end":{"date-parts":[[2018,10,26]]}},"container-title":["2018 2nd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8574117\/8602668\/08602978.pdf?arnumber=8602978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:37:17Z","timestamp":1643161037000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8602978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/csnet.2018.8602978","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}