2020
DOI: 10.5539/mas.v14n3p68
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Evolution, Growth and Recommendation for Detection

Abstract: Ransomware is a malicious program that can affect any person or organization. Ransomware is a complicated malicious attack that aims at lock or encrypt user files. Up to this date, there is no individual method, tool, which guarantee to protect against ransomware. Most tools available can detect some types of ransomware but it fails to detect other types of ransomware. In this research author talks about several methods, tools, procedures which can be taken to reduce the possibility of ransomware occurrences. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…Mohammad, in his research, explained two independent classifiers in reducing Crypto-Ransomware attacks, namely: first, user training, security policy, and data backup. Secondly, the detection system uses artificial intelligence [11]. Chakkaravarthy et al use the Intrusion Detection Honeypot (IDH) and Social Leopard Algorithm systems to detect Ransomware attacks through an early warning on the user's system against suspicious file activity [15].…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Mohammad, in his research, explained two independent classifiers in reducing Crypto-Ransomware attacks, namely: first, user training, security policy, and data backup. Secondly, the detection system uses artificial intelligence [11]. Chakkaravarthy et al use the Intrusion Detection Honeypot (IDH) and Social Leopard Algorithm systems to detect Ransomware attacks through an early warning on the user's system against suspicious file activity [15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Based on the mitigation process, the infected machine allows for data repair and recovery. The sixth stage of the result obtained in mitigation is the percentage value of relief applied, updating system detection, ransomware, and network security knowledge [11].…”
Section: Figure 4 Flowchart Of Experiments Research Stagesmentioning
confidence: 99%
See 1 more Smart Citation
“…With the growing numbers of mobile devices, ransomware, such as Wan-naLocker, SimpleLocker, Filecoder, and Black Rose Lucy [17,30], have found their way into the mobile ecosystem. Ransomware are generally of two types: locker ransomware and encryption ransomware [33]. Locker-type ransomware traditionally displays a persistent screen that prevents the user from interacting with the rest of the system.…”
Section: Ransomwarementioning
confidence: 99%
“…Ransomware developers have diversely created well-established methods to cause monetary damages to their victims. Consequently, this type of malware has constituted as one of the most threatening attacks targeting both individuals and organizations with financial losses to billions of dollars, which harmed one million Android users in one month [5], [6]. Additionally, Ransomware's recent success results in the manifestation of new families [4].…”
Section: Introductionmentioning
confidence: 99%