Corpus ID: 197868067

Ransomware , Threat and Detection Techniques : A Review

@inproceedings{Kok2019RansomwareT,
  title={Ransomware , Threat and Detection Techniques : A Review},
  author={S-H Kok and Azween Abdullah and N. Jhanjhi and Mahadevan Supramaniam},
  year={2019}
}
The popularity of ransomware has created a unique ecosystem of cybercriminals. Therefore, the objectives of this paper are to provide a thorough understanding of ransomware’s threat and discuss recent detection techniques used. Successful ransomware attack has direct financial implication, which is fuelled by several mature enablers, such as encryption technology, cyber currency and accessibility. Encryption is effective and almost unbreakable. Anonymous cyber currency can avoid traceability… CONTINUE READING
18 Citations

Figures and Tables from this paper

Evaluation metric for crypto-ransomware detection using machine learning
  • 1
  • PDF
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
  • 11
  • PDF
Volenti non fit injuria: Ransomware and its Victims
  • 2
  • PDF
Evolution, Mitigation, and Prevention of Ransomware
  • 1
A Three-Level Ransomware Detection and Prevention Mechanism
  • 5
  • PDF
Ransomware: A Framework for Security Challenges in Internet of Things

References

SHOWING 1-10 OF 34 REFERENCES
RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning
  • 30
  • PDF
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform
  • 7
  • PDF
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
  • 98
  • Highly Influential
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage Control
  • 16
  • PDF
The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform
  • 70
  • PDF
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)
  • 212
  • PDF
R-Locker: Thwarting ransomware action through a honeyfile-based approach
  • 48
  • PDF
Talos: no more ransomware victims with formal methods
  • 37
  • PDF
Ransomware prevention using application authentication-based file access control
  • 7
  • PDF
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection
  • 121
  • PDF