Open Access   Article Go Back

Ransomware: Evolution, Target and Safety Measures

A.K. Maurya1 , N. Kumar2 , A. Agrawal3 , R. A. Khan4

  1. Department of Information Technology, IET, Dr. Ram Manohar Lohia Avadh University, Faizabad, India.
  2. Department of Information Technology, SIST, BBAU Lucknow, India.
  3. Department of Information Technology, SIST, BBAU Lucknow, India.
  4. Department of Information Technology, SIST, BBAU Lucknow, India.

Correspondence should be addressed to: aumaurya@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 80-85, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.8085

Online published on Jan 31, 2018

Copyright © A.K. Maurya, N. Kumar, A. Agrawal, R. A. Khan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.K. Maurya, N. Kumar, A. Agrawal, R. A. Khan, “Ransomware: Evolution, Target and Safety Measures,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.80-85, 2018.

MLA Style Citation: A.K. Maurya, N. Kumar, A. Agrawal, R. A. Khan "Ransomware: Evolution, Target and Safety Measures." International Journal of Computer Sciences and Engineering 6.1 (2018): 80-85.

APA Style Citation: A.K. Maurya, N. Kumar, A. Agrawal, R. A. Khan, (2018). Ransomware: Evolution, Target and Safety Measures. International Journal of Computer Sciences and Engineering, 6(1), 80-85.

BibTex Style Citation:
@article{Maurya_2018,
author = {A.K. Maurya, N. Kumar, A. Agrawal, R. A. Khan},
title = {Ransomware: Evolution, Target and Safety Measures},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {80-85},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1636},
doi = {https://doi.org/10.26438/ijcse/v6i1.8085}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.8085}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1636
TI - Ransomware: Evolution, Target and Safety Measures
T2 - International Journal of Computer Sciences and Engineering
AU - A.K. Maurya, N. Kumar, A. Agrawal, R. A. Khan
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 80-85
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1342 891 downloads 331 downloads
  
  
           

Abstract

Security was a big deal for a long time. With the viruses, malware and ransomware are another problems seen by the practitioner. This paper shows working of ransomware with its evolution and general characteristics of few popular ransomware. In evolution part, the paper provides s study from first ransomware to current days. The study shows the light on various kind of infection performed by a ransomware including data infection and infected machine. Different attackers made choices to the target various attack; the paper provides a sight on various target types of the ransomware. This paper trying to demonstrate few ransomware attacks case studies to show the problem created by various ransomware as an example. After an attack, what a victim should do after infection is also discussed at the end of the paper. How people can save their system and what are the safety measures to save the system from ransomware, are also discussed by the researcher. At the end of the paper, the researcher points out few steps to save systems and data.

Key-Words / Index Term

Ransomware, Security, attack, Cryptowall, Cryptolock, Wannacry.

References

[1]. R. Richardson and M. Nort, Ransomware: Evolution, Mitigation and Prevention”, International Management Review, Vol. 13, No. 1 2017.
[2]. An Osterman Research, “Best Practices for Dealing With Phishing and Ransomware SPON”, White Paper Published September 2016.
[3]. C.Beek and A. Furtak, “Targeted ransomware No Longer a Future Threat: Analysis of a targeted and manual ransomware campaign”, Advanced Threat Research, Intel security, feb2016.
[4]. J. Wyke and A. Ajjan, “The Current State of Ransomware”, A SophosLabs technical paper December 2015.
[5]. WannaCry Response, Metasys, Johnson Control, June 2017.
[6]. WannaCry Rensomware Analysis, White paper, May 2017, Stream scan.
[7]. B. N. Giri, N. Jyoti, Mc. A. AVERT, AVAR 2006, Auckland.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.169.5881&rep=rep1&type=pdf
[8]. P. Bihola, R. Sheth, “Emerging Threats of 2017: Ransomware, IOC’s”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 2 | Issue 6, pp.-996-1003.
[9]. P.H. Rughani, Data recovery from ransomware affectedandroid phone using forensic tools, vo.-5, issue-8, International Journal of Computer science and Engineering, pp. 67-70.