Next Article in Journal
Design and Implementation of SFCI: A Tool for Security Focused Continuous Integration
Previous Article in Journal
On the Stability of a Hardware Compensation Mechanism for Embedded Energy Harvesting Emulators
 
 
Article
Peer-Review Record

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

by S. H. Kok 1,*, Azween Abdullah 1,*, NZ Jhanjhi 1,* and Mahadevan Supramaniam 2
Reviewer 1: Anonymous
Reviewer 3: Anonymous
Submission received: 23 August 2019 / Revised: 19 September 2019 / Accepted: 20 September 2019 / Published: 1 November 2019

Round 1

Reviewer 1 Report

Remove “(PEDA)” from the title.

Refer to image encryption and attacks from http://0-dx-doi-org.brum.beds.ac.uk/10.1109/ACCESS.2018.2883690 in the first paragraph.

Remove “1.1 Background”

Organize the introduction part following the general pattern of most scientific papers.

Embed every equation among a text sentence.Present every equation in a form can be found in any textbook on Calculus.

Combine Sec. 5 and 6 together.

Re-organize the paper by referring to http://abacus.bates.edu/~ganderso/biology/resources/writing/HTWtoc.html

Re-write the conclusion part by referring to https://writingcenter.unc.edu/tips-and-tools/conclusions/

Author Response

Dear Editor,

We really extend our thanks to the reviewers for the constructive comments which we found to be very helpful in improving the quality of our research work.

 

Kindly find below our Response to the reviewers’ comments :

Reviewer 1 :

Comment 1 :

Remove “(PEDA)” from the title.

Response :

“(PEDA)” has been removed from the title.

 

Comment 2 :

Refer to image encryption and attacks from http://0-dx-doi-org.brum.beds.ac.uk/10.1109/ACCESS.2018.288369 0 in the first paragraph.

Response :

Added (Figure 1) to better explain the issue of crypto-ransomware

 

Comment 3:

Remove “1.1 Background”

Response :

Section 1.1 has been changed to “2. Literature Review”.

 

Comment 4:

Organize the introduction part following the general pattern of most scientific papers.

Response :

Added another paragraph in Introduction to explain further the issue and solution.

 

Comment 5:

Embed every equation among a text sentence. Present every equation in a form can be found in any textbook on Calculus.

 

Response:

Equation has been embedded among text sentences.

 

Comment 6 :

Combine Sec. 5 and 6 together.

Response :

Section “Conclusion” and: Future Work” have been combined.

 

Comment 7:

Re-organize the paper by referring to http://abacus.bates.edu/~ganderso/biology/resources/ writing/HTWtoc.html

Response:

Thank you for the comment, we just following the journal format.

 

Comment 8:

Re-write the conclusion part by referring to https://writingcenter.unc.edu/tips-and-tools/ conclusions/

Response:

Conclusion has been re-written

Reviewer 2 Report

1. The authors have written the introduction well but the background (Sec 1.1) is too lengthy and vague. It may be improved.
2. The authors have done a good job in mitigating the ransomeware attack, but the authors need not mention the system configuration and the tool for machine learning algorithms either python/ weka/ R so as to replicate the work by anyone for their research/ implementation activities. 

Author Response

Dear Editor,

We really extend our thanks to the reviewers for the constructive comments which we found to be very helpful in improving the quality of our research work.

 

Kindly find below our Response to the reviewers’ comments :

Reviewer 2:

Comment 1 :

The authors have written the introduction well but the background (Sec 1.1) is too lengthy and vague. It may be improved

Response :

Section 1.1 has been changed to “2. Literature Review”.

Comment 2:

The authors have done a good job in mitigating the ransomware attack, but the authors need not mention the system configuration and the tool for machine learning algorithms either python/ weka/ R so as to replicate the work by anyone for their research/ implementation activities.

Response:

System configuration and tools have been included in Methodology section.

Reviewer 3 Report

This study proposed a pre-encryption detection algorithm (PEDA) and compares others detection algorithm. This paper is meaningful in that it suggests a new method to detect crypto-ransomware using machine learning. However, there are issues in the completeness or flow of the manuscript, so the overall revision is requested.

 

Authors need to ensure that the table of contents is in order and content. The contents of the introduction section are not organized. The order of Chapters 2, 3, and 4 also requires confirmation.

 

I wonder why there is no suggestion for an ensemble or integrated method that includes the presented model (PEDA). If possible, the detection rate of the PEDA will be improved. Finally, there is a lack of theoretical contribution as an academic study, and it is necessary to reinforce the contents that emphasize the strength of this research.

Author Response

Dear Editor,

We really extend our thanks to the reviewers for the constructive comments which we found to be very helpful in improving the quality of our research work.

 

Kindly find below our Response to the reviewers’ comments :

Reviewer 3 :

Comment 1 :

This study proposed a pre-encryption detection algorithm (PEDA) and compares others detection algorithm. This paper is meaningful in that it suggests a new method to detect crypto-ransomware using machine learning. However, there are issues in the completeness or flow of the manuscript, so the overall revision is required.

Response :

Modified Introduction and Conclusion to have better overall flow.

 

Comment 2:

Authors need to ensure that the table of contents is in order and content. The contents of the introduction section are not organized. The order of Chapters 2, 3, and 4 also requires confirmation.

Response :

We are thankful for your comments; the order of the paper follows as per the required template of the journal. Thanks again.

 

Comment 3 :

I wonder why there is no suggestion for an ensemble or integrated method that includes the presented model (PEDA). If possible, the detection rate of the PEDA will be improved. Finally, there is a lack of theoretical contribution as an academic study, and it is necessary to reinforce the contents that emphasize the strength of this research.

Response:

Modified Conclusion to enhance the importance of this study.

In addition, we take care of the English Language and grammar, had proofread again to make sure the desire quality of the paper.

 

Thank you for your kind attention.

 

Best Regards,

Research  team.

Round 2

Reviewer 1 Report

Presentation of every equation is wong. Typesetting is chaotic.

Author Response

We are again thankful to the anonymous reviewers for their efforts and comments, which really increased the quality level of our paper.

We addressed all the mentioned comments carefully and keep them highlighted in the text for quick view. In addition, we went through the English language professional services for the proofreading as suggested by the reviewers. We believe that the paper in the current form will be as per the expectations of the reviewers.

Thanks again for their efforts.  

Reviewer 3 Report

Authors have successfully modified the manuscript following reviewer's comment.

Author Response

We are again thankful to the anonymous reviewers for their efforts and comments, which really increased the quality level of our paper.

We addressed all the mentioned comments carefully and keep them highlighted in the text for quick view. In addition, we went through the English language professional services for the proofreading as suggested by the reviewers. We believe that the paper in the current form will be as per the expectations of the reviewers.

Thanks again for their efforts.

Back to TopTop