2022
DOI: 10.3390/s22051837
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

Abstract: Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems. Due to its unique characteristics, ransomware has attracted the attention of security professionals and researchers toward achieving safer and higher assurance systems that can effectively detect and prevent such attacks. The state-of-the-art crypto ransomware early detection models rely on specific data acquired during the runtim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(52 citation statements)
references
References 88 publications
0
52
0
Order By: Relevance
“…Ransomware refers to malicious software that encrypts a victim’s computer system or data, rendering it inaccessible until a ransom is paid. Due to its anonymity and difficulty in being tracked, cryptocurrencies like Bitcoin have become more and more in demand by ransomware attackers in recent years (Alqahtani and Sheldon, 2022). Receiving payments in Bitcoins is quite simple for the attackers since they simply need to supply a Bitcoin wallet address (Zimba et al , 2019).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ransomware refers to malicious software that encrypts a victim’s computer system or data, rendering it inaccessible until a ransom is paid. Due to its anonymity and difficulty in being tracked, cryptocurrencies like Bitcoin have become more and more in demand by ransomware attackers in recent years (Alqahtani and Sheldon, 2022). Receiving payments in Bitcoins is quite simple for the attackers since they simply need to supply a Bitcoin wallet address (Zimba et al , 2019).…”
Section: Resultsmentioning
confidence: 99%
“…Fonseca et al (2020) examined only psychological barriers to cryptocurrency adoption, while Gurgun et al (2022) explored the barriers to using cryptocurrency in managing the construction supply process using the empirical approach. Alqahtani and Sheldon (2022) conducted a systematic review of crypto-ransomware attack detection methodologies. Amsyar et al (2020) focused on a comprehensive assessment of the challenges that cryptocurrencies pose, while Eigelshoven and Parry (2021) study concentrated on a thorough review of the manipulation of cryptocurrency markets.…”
Section: Introductionmentioning
confidence: 99%
“…Data-centric and Process-centric approaches can be used all together for the detection of ransomware. This mixed approach can eliminate the issue of lesser available data during the pre-encryption phase [7]. This approach is still in the early stages, authors did not provide experimental data to show that their strategy is superior to others [31].…”
Section: Existing Workmentioning
confidence: 99%
“…Alqahtani et al [ 12 ], offered a survey that is dedicated to studying and assessing the state-of-the-art in ransomware detection and prevention in the interest of aiding the scientists that attempts to disrupt this extremely significant and rising malware issue. The emphasis is on cryptographic ransomware since it is the kind that is the most common, damaging, and difficult to deal with.…”
Section: Related Workmentioning
confidence: 99%
“…The ransomware attacks can be divided into three categories: Crypto ransomware [ 12 ] where the attackers use the encryption and decryption algorithm (i.e., public-private key) to encrypt the data and files, hold the decryption key, and demand for ransomware. The decryption key is handed over once the victims pay the ransom amount.…”
Section: Introductionmentioning
confidence: 99%