An Analysis on Ransomware and System Safety
Keywords:
Ransomware, System Security, malicious file, AttacksAbstract
As we can see computer has start playing a big role in our daily life.
From the very beginning if we see we humans are not much dependent
on computers but if we see nowadays it is like our own fragment that
we can’t work without computer. While use of computers in our life is
increased with this our cyber securities complexities are also increased as
well. Very next day we hear new kind of cyber-attacks on our computers
it not just only affects our daily life but it also disturbs our digital world
also. As the cyber-attacks are increasing day by day, different kinds of
attacks are introduced yet among all the dangerous attacks one is rated
high known as Ransomware. In this paper we will explore and learn
more about Ransomware that how it attacks and affect your computer
and how it actually works like and how dangerous it is.
References
Aidan JS, Verma HK, Awasthi LK. Comprehensive Survey
on Petya Ransomware Attack. International Conference
on Next Generation Computing and Information
Systems (ICNGCIS), Jammu, 2017; 122-125.
Ko JJJD, Kim SC, Kwak J. Real Time Android Ransomware
Detection by Analyzed Android Applications.
International Conference on Electronics, Information,
and Communication (ICEIC), Auckland, New Zealand,
; 1-5.
Almashhadani AO, Kaiiali MSS, Kane OP. A MultiClassifier Network-Based Crypto Ransomware Detection
System: A Case Study of Locky Ransomware. IEEE Access
; 7: 47053-47067.
Agrawal R, Stokes JW, Selvaraj K et al. Attention
in Recurrent Neural Networks for Ransomware
Detection,” ICASSP 2019 - 2019 IEEE International
Conference on Acoustics, Speech and Signal Processing
(ICASSP), Brighton, United Kingdom, 2019; 3222-3226.
Sheen S, Yadav A. Ransomware detection by mining API
call usage,” 2018 International Conference on Advances
in Computing. Communications and Informatics
(ICACCI), Bangalore, 2018; 983-987.
Naik N, Jenkins P, Savage N et al. Cyberthreat Hunting
- Part 2: Tracking Ransomware Threat Actors using
Fuzzy Hashing and Fuzzy C-Means Clustering,” 2019
IEEE International Conference on Fuzzy Systems (FUZZIEEE), New Orleans, LA, USA, 2019; 1-6.
Kara I, Aydos M. Static and Dynamic Analysis of Third
Generation Cerber Ransomware,” 2018 International
Congress on Big Data, Deep Learning and Fighting Cyber
Terrorism (IBIGDELFT), ANKARA, Turkey, 2018; 12-17
Saxena S, Soni HK. Strategies for Ransomware Removal
and Prevention. 2018 Fourth International Conference
on Advances in Electrical, Electronics, Information,
Communication and Bio-Informatics (AEEICB), Chennai,
; 1-4.
Naik N, Jenkins P, Savage N et al. Cyberthreat Hunting
- Part 1: Triaging Ransomware using Fuzzy Hashing,
Import Hashing and YARA Rules. 2019 IEEE International
Conference on Fuzzy Systems (FUZZ-IEEE), New Orleans,
LA, USA, 2019; 1-6.
Butt UJ, Abbod M, Lors A et al. Ransomware Threat
and its Impact on SCADA,” 2019 IEEE 12th International
Conference on Global Security, Safety and Sustainability
(ICGS3), London, United Kingdom, 2019; 205-212.
Ferreira A. Why Ransomware Needs A Human
Touch,” 2018 International Carnahan Conference on
Security Technology (ICCST), Montreal, QC, 2018; 1-5.
Aidan JS, Zeenia , Garg U. Advanced Petya Ransomware
and Mitigation Strategies. 2018 First International
Conference on Secure Cyber Computing and
Communication (ICSCCC), Jalandhar, India, 2018; 23-28.
Lokuketagoda B, Weerakoon MP, Kuruppu UM et al.
R - Killer: An Email Based Ransomware Protection
Tool,” 2018 13th International Conference on Computer
Science & Education (ICCSE), Colombo, 2018; 1-7.
Butt UJ, Abbod M, Lors A et al. Ransomware Threat
and its Impact on SCADA,” 2019 IEEE 12th International
Conference on Global Security, Safety and Sustainability
(ICGS3), London, United Kingdom, 2019; 205-212.
Naik N, Jenkins P, Savage N et al. Cyberthreat Hunting
Part 1: Triaging Ransomware using Fuzzy Hashing,
Import Hashing and YARA Rules. 2019 IEEE International
Conference on Fuzzy Systems (FUZZ-IEEE), New Orleans,
LA, USA, 2019; 1-6.