2018
DOI: 10.4108/eai.13-7-2018.162691
|View full text |Cite
|
Sign up to set email alerts
|

A Three-Level Ransomware Detection and Prevention Mechanism

Abstract: Ransomware encrypts victim's files or locks users out of the system. Victims will have to pay the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals and companies through email attachments and download links. NotPetya has worm-like capabilities and exploits EternalBlue and EternalRomance vulnerabilities. Protection methods include vaccination, applying patches, et cetera. Challenges faced to combat ransomware include social engineering, outdated infrastructures, technol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 5 publications
(7 reference statements)
0
7
0
Order By: Relevance
“…In addition to machine learning, heuristic-based approaches have also been a focal point of research [17,32,7]. These methods rely on a set of rules or algorithms to detect ransomware based on known behaviors and characteristics, allowing for the identification of ransomware even in the absence of specific malware signatures [33,34,4].…”
Section: Detection and Prevention Methodologiesmentioning
confidence: 99%
“…In addition to machine learning, heuristic-based approaches have also been a focal point of research [17,32,7]. These methods rely on a set of rules or algorithms to detect ransomware based on known behaviors and characteristics, allowing for the identification of ransomware even in the absence of specific malware signatures [33,34,4].…”
Section: Detection and Prevention Methodologiesmentioning
confidence: 99%
“…Little to no research has been conducted till now to detect ransomware inside the browser or even have the capability to warn the users. Ren et al [72] designed a three-layer-security solution that in its first stage used a browser extension that could identify malicious websites and also kept track of unauthorized down-loads that occurred through these websites. A major downside of this extension is that it can only block websites that are already residing in a predefined list.…”
Section: Browsers As the First Line On Defensementioning
confidence: 99%
“…As soon as this pandemic outbreak started, a financial recession was already predicted by the experts. At the same time, the financial industries are vulnerable to cyber threats such as phishing and Malware [14] or ransomware [15] attacks. In addition to this, in a normal situation, the fintech users have mostly become the victim of social engineering, where the hackers use certain tricks to pretend to be the legit person and get access to personal information such as password recovery.…”
Section: ) Financial Servicesmentioning
confidence: 99%