Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things

@article{AlHawawreh2019TargetedRA,
  title={Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things},
  author={Muna Sulieman Al-Hawawreh and Frank den Hartog and Elena Sitnikova},
  journal={IEEE Internet of Things Journal},
  year={2019},
  volume={6},
  pages={7137-7151}
}
Much value in a brownfield Industrial Internet of Things (IIoT) implementation resides at its edge tier, where new types of devices and technologies are deployed to interoperate the legacy industrial control systems with servers and systems in the cloud, and leverage the benefits of the Internet of Things technologies. One of these novel devices is the IIoT edge gateway, which is used to connect critical physical systems with the cyber world, and to provide consistent storage, processing, and… 

Developing a Security Testbed for Industrial Internet of Things

A new generic end-to-end IIoT security testbed is proposed, with a particular focus on the brownfield system and details of the testbed’s architectural design and the implementation process are provided.

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

This study investigates using a practical CTI approach and different CTH models to detect known and unknown ransomware attacks and discussed the available ransomware datasets used in present ransomware studies.

A threat intelligence framework for protecting smart satellite-based healthcare networks

A ransom denial of service (RDoS) as a new threat that would exploit CoAP protocol’s vulnerabilities is presented and a real-time discovery of attacks’ network behaviours using deep learning is presented.

Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions

A set of unified metrics to evaluate published studies on ransomware mitigation are proposed, and applied the metrics to 118 such studies to comprehensively compare and contrast their pros and cons, with the attempt to evaluate their relative strengths and weaknesses.

RANSOMWARE: A SURVEY ON VARIOUS ATTACKS AND DEFENSE MECHANISMS

  • G. S.K. Anitha Kumari
  • Computer Science
    Proceedings of the First International Conference on Combinatorial and Optimization, ICCAP 2021, December 7-8 2021, Chennai, India
  • 2021
The overall outline of various attacks and the techniques used in ransomware are looked at and the crypto-ware malware methodologies are talked about.

AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things

This manuscript recaps and largely expands previous works on AntibIoTic, providing an enhanced design of the system, an extended proof-of-concept that proves its feasibility and shows its operation, and an experimental evaluation that reports the low computational overhead it causes.

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks

The experimental result confirms that the proposed Intrusion Detection Honeypot significantly improves the ransomware detection time, rate, and accuracy compared with the existing state of the art ransomware detection model.

Asynchronous Peer-to-Peer Federated Capability-based Targeted Ransomware Detection Model for Industrial IoT

An exhaustive set of experiments prove the high effectiveness of the proposed model in detecting targeted ransomware (known and unknown attacks) in brownfield IIoT and the superiority over the state-of-the-art models.

An Immunization Scheme for Ransomware

The idea of virus immunity is used to design an immunization solution for ransomware viruses to solve the problems of traditional ransomware defense methods, which cannot meet the requirements of rapid detection and immediate prevention of new outbreaks attacks.

References

SHOWING 1-10 OF 44 REFERENCES

The rise of ransomware and emerging security challenges in the Internet of Things

Out of Control : Ransomware for Industrial Control Systems

This work develops the first known version of ransomware that targets programmable logic controllers, discusses the economic implications of such an attack, and lays out a generic framework for ICS ransomware to aid in future study and defenses.

RANSOMWARE ANALYSIS: INTERNET OF THINGS (IOT) SECURITY ISSUES, CHALLENGES AND OPEN PROBLEMS INTHE CONTEXT OF WORLDWIDE SCENARIO OF SECURITY OF SYSTEMS AND MALWARE ATTACKS

This paper ensures the awareness of Ransomware attack, its analysis during the course of time from its origination, geographical attacking analysis and operating system based attacks, and whether the information obtained can be used to aid R ransomware attacks especially in the IoT era.

Network detection of ransomware delivered by exploit kit

A framework for the detection of malicious communication and prevention of the user data, from being encrypted by using a combination of Software Defined Networking and Certificate Authority Checker aka CAC respectively is proposed.

Virtualization of SCADA testbeds for cybersecurity research: A modular approach

HelDroid: Dissecting and Detecting Mobile Ransomware

HelDroid is presented, a fast, efficient and fully automated approach that recognizes known and unknown scareware and ransomware samples from goodware, based on detecting the "building blocks" that are typically needed to implement a mobile ransomware application.

Survey on Ransomware: A New Era of Cyber Attack

With the damage cause by the latest attack of ransomware around the world, it is proved that there is lacks of awareness among the company professionals is confirmed and pay a high amount of money in bit-coins.