Ransomware , Threat and Detection Techniques : A Review
@inproceedings{Kok2019RansomwareT, title={Ransomware , Threat and Detection Techniques : A Review}, author={S-H Kok and Azween Abdullah and N. Jhanjhi and Mahadevan Supramaniam}, year={2019} }
The popularity of ransomware has created a unique ecosystem of cybercriminals. Therefore, the objectives of this paper are to provide a thorough understanding of ransomware’s threat and discuss recent detection techniques used. Successful ransomware attack has direct financial implication, which is fuelled by several mature enablers, such as encryption technology, cyber currency and accessibility. Encryption is effective and almost unbreakable. Anonymous cyber currency can avoid traceability… CONTINUE READING
18 Citations
Evaluation metric for crypto-ransomware detection using machine learning
- Computer Science
- J. Inf. Secur. Appl.
- 2020
- 1
- PDF
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
- Computer Science
- Comput.
- 2019
- 11
- PDF
Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches
- Computer Science
- IEEE Access
- 2020
- 5
- PDF
Volenti non fit injuria: Ransomware and its Victims
- Computer Science
- 2019 IEEE International Conference on Big Data (Big Data)
- 2019
- 2
- PDF
Evolution, Mitigation, and Prevention of Ransomware
- Computer Science
- 2020 2nd International Conference on Computer and Information Sciences (ICCIS)
- 2020
- 1
A Three-Level Ransomware Detection and Prevention Mechanism
- Engineering, Computer Science
- EAI Endorsed Trans. Energy Web
- 2020
- 5
- PDF
Ransomware: A Framework for Security Challenges in Internet of Things
- Computer Science
- 2020 2nd International Conference on Computer and Information Sciences (ICCIS)
- 2020
References
SHOWING 1-10 OF 34 REFERENCES
RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning
- Computer Science
- 2018 10th International Conference on Communication Systems & Networks (COMSNETS)
- 2018
- 30
- PDF
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform
- Computer Science
- 2018 IEEE International Conference on Electro/Information Technology (EIT)
- 2018
- 7
- PDF
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
- Computer Science
- Comput. Secur.
- 2018
- 98
- Highly Influential
The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform
- Computer Science
- Mob. Inf. Syst.
- 2016
- 70
- PDF
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)
- Computer Science
- SANER
- 2016
- 212
- PDF
R-Locker: Thwarting ransomware action through a honeyfile-based approach
- Computer Science
- Comput. Secur.
- 2018
- 48
- PDF
Talos: no more ransomware victims with formal methods
- Computer Science
- International Journal of Information Security
- 2017
- 37
- PDF
Ransomware prevention using application authentication-based file access control
- Computer Science
- SAC
- 2018
- 7
- PDF
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection
- Computer Science
- ArXiv
- 2016
- 121
- PDF