Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules.
Nitin NaikPaul JenkinsNick SavageLongzhi YangPublished in: FUZZ-IEEE (2019)
Keyphrases
- hash functions
- order preserving
- rule generation
- hashing algorithm
- data structure
- fuzzy logic
- rule extraction
- nearest neighbor search
- file organization
- membership functions
- fuzzy clustering
- random projections
- video copy detection
- approximate nearest neighbor search
- fuzzy numbers
- similarity search
- decision trees
- fuzzy sets
- hash tables
- association rule mining
- decision rules
- t norm
- hashing methods
- fuzzy rules
- fuzzy association rules
- neural network
- rule selection
- fuzzy if then rules
- hamming distance
- case study
- locality sensitive
- production rules