2020
DOI: 10.1016/j.fsidi.2020.300979
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of live forensic techniques in ransomware attack mitigation

Abstract: Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arms race" with the ransomware developers attempting to defend their digital infrastructure against such attacks. Recent manifestations of ransomware have started to employ a hybrid combination of symmetric and asymmetric encryption to encode user's files. This paper describes an investigation that tried to determine if the techniques curren… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(38 citation statements)
references
References 17 publications
(61 reference statements)
0
17
0
1
Order By: Relevance
“…A ransomware is more menacing than malware, as it not only damages the system and results in loss of control from the system but also demands compensation in return. Therefore, there is a need to have the proper distinction of ransomware from other malware (Aurangzeb et al, 2017;Kok et al, 2019;Zhang et al, 2019) to save billions of dollars in financial losses (Davies, Macfarlane & Buchanan, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…A ransomware is more menacing than malware, as it not only damages the system and results in loss of control from the system but also demands compensation in return. Therefore, there is a need to have the proper distinction of ransomware from other malware (Aurangzeb et al, 2017;Kok et al, 2019;Zhang et al, 2019) to save billions of dollars in financial losses (Davies, Macfarlane & Buchanan, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…This study uses a live forensics method as a first step to identify the behavior of a virus that attacks one of the host computers in a computer network [20], [21]. The stages of the live forensic method in this study are as shown in Figure 1.…”
Section: Methodsmentioning
confidence: 99%
“…The process of creating a virtual environment using VirtualBox and GNS3 software to perform valid and realistic ransomware experiments. In this virtual environment, already available viruses, data, files, infected computers and clean computers [25], making it possible to carry out mitigation to prevent the spread of viruses from cleaning computers. The environmental structure design in this study is as shown in Figure 1.…”
Section: Cloud Network Environmentmentioning
confidence: 99%