2021
DOI: 10.18280/ijsse.110304
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)

Abstract: Sodinokibi Ransomware virus becomes a severe threat by targeting data encryption on a server, and this virus infection continues to spread to encrypt data on other computers. This study aims to mitigate by experiment with building a prevention system through computer network management. The mitigation process is carried out through static, dynamic, and Software-Defined Networking (SDN) analysis to prevent the impact of attacks through programmatic network management. SDN consists of two main components in its … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 25 publications
0
14
0
Order By: Relevance
“…In the Proof-of-Work (PoW) algorithm, validating a block requires solving a mathematical puzzle. The time it takes to validate new blocks and the computing power of the miner nodes both affect how challenging the puzzle needs to be [24][25][26][27].…”
Section: Background Of Bcmentioning
confidence: 99%
“…In the Proof-of-Work (PoW) algorithm, validating a block requires solving a mathematical puzzle. The time it takes to validate new blocks and the computing power of the miner nodes both affect how challenging the puzzle needs to be [24][25][26][27].…”
Section: Background Of Bcmentioning
confidence: 99%
“…Literature [31] used a Bayesian risk graph to model risks, so as to quantitatively calculate the risks faced by the system. Literature [32] proposed an information security risk assessment method based on the combination of a genetic algorithm and BP neural network.…”
Section: Related Workmentioning
confidence: 99%
“…One application of computer network security systems using sniffing or monitoring techniques allows administrators to monitor the data traffic and all activities and save the network monitoring results into a log file [2]. Logs are a source of information that can troubleshoot, record system breaches, attack activity, forensic needs, and investigations to find digital evidence according to standards [3].…”
Section: Introductionmentioning
confidence: 99%