An Analysis on Ransomware and System Safety

Authors

  • Arpit Kumar Sharma Research Scholars
  • Sayar Singh Shekhawat
  • Charchit Sharma
  • Chirayu Mehta Research Scholars

Keywords:

Ransomware, System Security, malicious file, Attacks

Abstract

As we can see computer has start playing a big role in our daily life.
From the very beginning if we see we humans are not much dependent
on computers but if we see nowadays it is like our own fragment that
we can’t work without computer. While use of computers in our life is
increased with this our cyber securities complexities are also increased as
well. Very next day we hear new kind of cyber-attacks on our computers
it not just only affects our daily life but it also disturbs our digital world
also. As the cyber-attacks are increasing day by day, different kinds of
attacks are introduced yet among all the dangerous attacks one is rated
high known as Ransomware. In this paper we will explore and learn
more about Ransomware that how it attacks and affect your computer
and how it actually works like and how dangerous it is.

Author Biographies

Arpit Kumar Sharma, Research Scholars

Computer and Communication Engineering, Manipal University Jaipur,
Jaipur

Charchit Sharma

Department of Computer Science, Arya Institute of Engineering Technology, Jaipur.

Chirayu Mehta, Research Scholars

Department of Computer Science, Arya Institute of Engineering Technology, Jaipur

References

Aidan JS, Verma HK, Awasthi LK. Comprehensive Survey

on Petya Ransomware Attack. International Conference

on Next Generation Computing and Information

Systems (ICNGCIS), Jammu, 2017; 122-125.

Ko JJJD, Kim SC, Kwak J. Real Time Android Ransomware

Detection by Analyzed Android Applications.

International Conference on Electronics, Information,

and Communication (ICEIC), Auckland, New Zealand,

; 1-5.

Almashhadani AO, Kaiiali MSS, Kane OP. A MultiClassifier Network-Based Crypto Ransomware Detection

System: A Case Study of Locky Ransomware. IEEE Access

; 7: 47053-47067.

Agrawal R, Stokes JW, Selvaraj K et al. Attention

in Recurrent Neural Networks for Ransomware

Detection,” ICASSP 2019 - 2019 IEEE International

Conference on Acoustics, Speech and Signal Processing

(ICASSP), Brighton, United Kingdom, 2019; 3222-3226.

Sheen S, Yadav A. Ransomware detection by mining API

call usage,” 2018 International Conference on Advances

in Computing. Communications and Informatics

(ICACCI), Bangalore, 2018; 983-987.

Naik N, Jenkins P, Savage N et al. Cyberthreat Hunting

- Part 2: Tracking Ransomware Threat Actors using

Fuzzy Hashing and Fuzzy C-Means Clustering,” 2019

IEEE International Conference on Fuzzy Systems (FUZZIEEE), New Orleans, LA, USA, 2019; 1-6.

Kara I, Aydos M. Static and Dynamic Analysis of Third

Generation Cerber Ransomware,” 2018 International

Congress on Big Data, Deep Learning and Fighting Cyber

Terrorism (IBIGDELFT), ANKARA, Turkey, 2018; 12-17

Saxena S, Soni HK. Strategies for Ransomware Removal

and Prevention. 2018 Fourth International Conference

on Advances in Electrical, Electronics, Information,

Communication and Bio-Informatics (AEEICB), Chennai,

; 1-4.

Naik N, Jenkins P, Savage N et al. Cyberthreat Hunting

- Part 1: Triaging Ransomware using Fuzzy Hashing,

Import Hashing and YARA Rules. 2019 IEEE International

Conference on Fuzzy Systems (FUZZ-IEEE), New Orleans,

LA, USA, 2019; 1-6.

Butt UJ, Abbod M, Lors A et al. Ransomware Threat

and its Impact on SCADA,” 2019 IEEE 12th International

Conference on Global Security, Safety and Sustainability

(ICGS3), London, United Kingdom, 2019; 205-212.

Ferreira A. Why Ransomware Needs A Human

Touch,” 2018 International Carnahan Conference on

Security Technology (ICCST), Montreal, QC, 2018; 1-5.

Aidan JS, Zeenia , Garg U. Advanced Petya Ransomware

and Mitigation Strategies. 2018 First International

Conference on Secure Cyber Computing and

Communication (ICSCCC), Jalandhar, India, 2018; 23-28.

Lokuketagoda B, Weerakoon MP, Kuruppu UM et al.

R - Killer: An Email Based Ransomware Protection

Tool,” 2018 13th International Conference on Computer

Science & Education (ICCSE), Colombo, 2018; 1-7.

Butt UJ, Abbod M, Lors A et al. Ransomware Threat

and its Impact on SCADA,” 2019 IEEE 12th International

Conference on Global Security, Safety and Sustainability

(ICGS3), London, United Kingdom, 2019; 205-212.

Naik N, Jenkins P, Savage N et al. Cyberthreat Hunting

Part 1: Triaging Ransomware using Fuzzy Hashing,

Import Hashing and YARA Rules. 2019 IEEE International

Conference on Fuzzy Systems (FUZZ-IEEE), New Orleans,

LA, USA, 2019; 1-6.

Published

2020-06-07