Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3233249
|View full text |Cite
|
Sign up to set email alerts
|

A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation

Abstract: In the last decade, crypto-ransomware evolved from a family of malicious software with scarce repercussion in the research community, to a sophisticated and highly effective intrusion method positioned in the spotlight of the main organizations for cyberdefense. Its modus operandi is characterized by fetching the assets to be blocked, their encryption, and triggering an extortion process that leads the victim to pay for the key that allows their recovery. This paper reviews the evolution of crypto-ransomware f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…Mehnaz and Mudgerikar [ 34 ] also used the decoy approach for early ransomware detection and prevention. Moreover, relying solely on decoy-based detection does not ensure that ransomware will target the decoy files first, thereby placing the victim’s data at considerable risk [ 35 , 36 ].…”
Section: Ransomware Detection and Neutralization Methodsmentioning
confidence: 99%
“…Mehnaz and Mudgerikar [ 34 ] also used the decoy approach for early ransomware detection and prevention. Moreover, relying solely on decoy-based detection does not ensure that ransomware will target the decoy files first, thereby placing the victim’s data at considerable risk [ 35 , 36 ].…”
Section: Ransomware Detection and Neutralization Methodsmentioning
confidence: 99%
“…Kolodenker et al [132] proposed Paybreak, which fights ransomware by keeping by holding encryption keys in escrow and allowing victims to restore encrypted files without paying the ransom. Monge et al [137] stressed on monitoring the environment without the involvement of a human operator. Their model is based on a self-organizing network framework and involves mitigation against crypto-ransomware families that contact suspicious C&C servers for encryption keys.…”
Section: Mitigationmentioning
confidence: 99%
“…The conventional detection models made the decisions by considering the entire runtime data. Some of these models fell in post-encryption phase while performing the detection [124,125].…”
Section: Conventional Detection Studiesmentioning
confidence: 99%