2021 6th IEEE Workshop on the Electronic Grid (eGRID) 2021
DOI: 10.1109/egrid52793.2021.9662158
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Attack Modeling and Artificial Intelligence-Based Ransomware Detection for Digital Substations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…It is clear that defensive strategies must transcend the realm of mere technological solutions and encompass tactical counteractions to combat the psychological manipulation and persuasive elements prevalent in ransomware assaults [19], [21]. This necessitates the consideration and implementation of deceptive methodologies, such as the deployment of honeypots [2], [45]. These honeypots serve a dual purpose: they act as baits to lure potential ransomware threats, thereby allowing for their early identification and comprehensive analysis, and they function as a means to safeguard the broader network infrastructure from the damaging impact of these threats [46], [47].…”
Section: B Strategic Adjustments In Cyber Defensementioning
confidence: 99%
See 1 more Smart Citation
“…It is clear that defensive strategies must transcend the realm of mere technological solutions and encompass tactical counteractions to combat the psychological manipulation and persuasive elements prevalent in ransomware assaults [19], [21]. This necessitates the consideration and implementation of deceptive methodologies, such as the deployment of honeypots [2], [45]. These honeypots serve a dual purpose: they act as baits to lure potential ransomware threats, thereby allowing for their early identification and comprehensive analysis, and they function as a means to safeguard the broader network infrastructure from the damaging impact of these threats [46], [47].…”
Section: B Strategic Adjustments In Cyber Defensementioning
confidence: 99%
“…This possibility necessitates a cautious approach to interpreting the results, suggesting that they should be viewed as indicative rather than conclusive. Such caution is advised especially when integrating these findings into a broader cybersecurity research framework, where they should be corroborated with additional studies and methods to ensure a more holistic understanding of the ransomware landscape [45], [50], [51].…”
Section: Limitations Of the Studymentioning
confidence: 99%
“…The study's results demonstrate that while LLMs like ChatGPT and Claude can effectively simulate human-like negotiation tactics, their performance varies based on the ransomware type and the specific scenario [1], [31], [46]. This variability underscores the potential and limitations of AI-driven cybersecurity solutions, [28], [31].…”
Section: B Implications For Cybersecuritymentioning
confidence: 99%
“…• Cryptoransomware: Exhibiting greater complexity than locker variants, cryptoransomware is notorious for encrypting crucial data and files within the victim's system [30]. The process of recovery without the specific decryption key, which is typically in the possession of the attacker, is often an insurmountable task [31]. • Data Theft Ransomware: Representing an advanced stage in the evolution of ransomware, this variant not only encrypts the data but also poses the threat of publicizing sensitive information extracted from the victim's network unless a ransom is paid, thus introducing an extra layer of pressure and coercion [32], [33], [34].…”
Section: A Understanding Ransomwarementioning
confidence: 99%
“…For organizations, the repercussions are multifaceted, encompassing not just the immediate financial drain due to ransom payments but also extending to long-term reputational harm, operational disruptions, and the looming threat of legal repercussions [29]. These attacks also have a profound impact on the societal level, where the erosion of public confidence in digital infrastructure becomes apparent, and the potential disruption of essential services emerges as a significant concern [30], [31]. For instance, the 2021 cyber attack on the Colonial Pipeline, a crucial fuel conduit in the USA, led to extensive fuel scarcities and served as a stark reminder of how ransomware can cripple critical infrastructure [32], [34].…”
Section: B Impact Of Ransomware Attacksmentioning
confidence: 99%