2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) 2021
DOI: 10.1109/ccwc51732.2021.9376179
|View full text |Cite
|
Sign up to set email alerts
|

Key Factors Influencing the Rise of Current Ransomware Attacks on Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…Lastly, ransomware attacks on transportation systems can be motivated by politics. State-sponsored actors may execute ransomware attacks on transportation systems to destroy their rivals' infrastructure or further their political ambitions [47]. These attacks may be part of a larger operation to destabilise or destroy the economy of the target nation.…”
Section: Interruptions In Servicementioning
confidence: 99%
“…Lastly, ransomware attacks on transportation systems can be motivated by politics. State-sponsored actors may execute ransomware attacks on transportation systems to destroy their rivals' infrastructure or further their political ambitions [47]. These attacks may be part of a larger operation to destabilise or destroy the economy of the target nation.…”
Section: Interruptions In Servicementioning
confidence: 99%
“…Ransomware presents a significant threat to organizations and individuals, as it encrypts files rendering computer systems inoperable. A decryption key may be provided after a ransom is paid [5,6], but not always. The irreversible effect of such an attack can be devastating due to the disruption in services and especially because, in some cases, after paying the ransom, the decryption key provided is useless [7] in restoring operations.…”
Section: Introductionmentioning
confidence: 99%
“…Their reach extends beyond traditional computers to mobile and IoT/Cyber-Physical Systems, necessitating a deep dive into ransomware behavior and the evaluation of defense strategies across different platforms [4]. The substantial impact of such attacks is evident from the global damages inflicted on various systems around the world [5][6][7][8]. Given the complexity of ransomware, showcased by variants like LockBit 2.0, it is clear that advanced preventative and remediation strategies are needed [9,10].…”
Section: Introductionmentioning
confidence: 99%