Open Access   Article Go Back

Ransomware: Detection And Prevention

Annu 1 , Monika Poriye2 , Vinod Kumar3

  1. Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, India.
  2. Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, India.
  3. Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 900-905, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.900905

Online published on May 31, 2018

Copyright © Annu, Monika Poriye, Vinod Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Annu, Monika Poriye, Vinod Kumar, “Ransomware: Detection And Prevention,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.900-905, 2018.

MLA Style Citation: Annu, Monika Poriye, Vinod Kumar "Ransomware: Detection And Prevention." International Journal of Computer Sciences and Engineering 6.5 (2018): 900-905.

APA Style Citation: Annu, Monika Poriye, Vinod Kumar, (2018). Ransomware: Detection And Prevention. International Journal of Computer Sciences and Engineering, 6(5), 900-905.

BibTex Style Citation:
@article{Poriye_2018,
author = {Annu, Monika Poriye, Vinod Kumar},
title = {Ransomware: Detection And Prevention},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {900-905},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2085},
doi = {https://doi.org/10.26438/ijcse/v6i5.900905}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.900905}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2085
TI - Ransomware: Detection And Prevention
T2 - International Journal of Computer Sciences and Engineering
AU - Annu, Monika Poriye, Vinod Kumar
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 900-905
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
943 377 downloads 246 downloads
  
  
           

Abstract

Now a day everyone wants data to be secure from malicious users. What happens when data is hijacked? Ransomware hijacks user data on different OS like the window, Android, Mac etc. Ransomware is most popular and destructive malware in the cyber world. It can be dispersed via affected spam emails, infected application, infected external storage device and negotiated sites. Ransomware blocks system in a different way. One way to lock the system and another is (crypto ransomware wh¬¬ich) to encrypt the data. After encrypting/locking the system data ransom money will be demanded and time is allotted by the hacker for decryption/unlocking. The main goal of Ransomware is always force to pay money not like other types of attack. Ransom money is in the form of bitcoin because it is harder to trace. There are some tools are invented to prevent system from attack like heldroid, honeypot, and wannakiwi etc. This paper focuses on ransomware prevention technique which helps you to detect and remove ransomware from the system.

Key-Words / Index Term

encryption, decryption, malware, hijack, ransom, bitcoin, EternalBlue, IDS

References

[1] Azad Ali, “Ransomware: A research and a personal case study of dealing with this Nasty Malware” Issues in Information Science +Information Technology, Vol. 14, 2017.
[2] Daniel Gonzalez and Thaier Hayajneh, “Detection and prevention of Crypto-ransomware,” IEEE, 978-1-5386-1104-3/17, 2017.
[3] Timothy Gallo, Allan Liska, “Ransomware” published by O`Reilly Media, Inc., ISBN: 9781491967874,Release Date: December 2016.
[4] “Ransomware holding your data hostage,” Deloitte Development Lcc, issue date: August 12, 2016, Serial: W-TS-EN-16-00734.
[5] Amin Kharraz “Techniques and Solutions for Addressing ransomware Attacks”, College of Computer and Information Science Northeastern University, July 2017.
[6] Nadeem Shah and Mohammed Farik, “Ransomware-Threats, Vulnerabilities And Recommendation”, International Journal Of Scientific & Technology Research(IJSTR), ISSN:2277-8616, Vol. 6, Issue.06 June, 2017.
[7] Chris Moore, “Detecting ransomware with Honeypot technique”, CyberSecurity and Cyberforensic conference IEEE,978-1-5090-2657-9/16,2016.
[8] Lam Zhanhui and Nor Azlina Adb Rahman,“A Review on ransomware Trend of Attacks and Prevention”, International Journal of Applied Engineering Research, ISSN:0973-4562, Vol. 12, No. 16, pp.6201-6210, 2017.
[9] Sherya Chadha and Utham Kumar , “Ransomware : Let’s Fight Back !”, International Conference on Computing, Communication and Automation (ICCCA2017).ISBN:978-1-5090-6471-7/17 IEEE 2017.
[10] Sonu B. Surati, Ghanshyam I. Prajapti , “ A Review on Ransomware detection and prevention” International journal of research and Scientific Innovation, Vol. 5, Serial no 9 Sept, 2017 ISSN:2321-2705
[11] Muhammet Baykara and Baran Sekin, “A Novel Approach to Ransomware: Designing a Safe Zone System”, ISBN: 978-1-5386-3449-3, 2018 IEEE.
[12] Kevin Savage, Peter Coorgen, and Hon Lau “The evolution of Ransomware”, Security Response, Symantec, version 1.0 August 6, 2015.
[13] Adam Alessandrini “RANSOMWARE Hostage Rescue Manual” published by Knownbe4, Tel: 855-KNOWBE4 (566-9234)
[14] Dr.P.B.Pathak, “A Dangerous Trend of Cybercrime: Ransomware Growing Challenge”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278-1323,Volume 5, Issue 2, February 2016.
[15] Nolen Scaife,Henry Carter,Patrick Traynor and Kevin R.B. Butler, “CryptoLock (and Drop It):Stopping Ransomware Attacks on User Data ”, ISSN NO-1063-6927,IEEE 2016.
[16] S.Mahmudha Fasheem, P.Kanimozhi, and B.AkoraMurthy,“Detection and Avoidance of Ransomware”, International Journal of Engineering Development and Research, Volume 5, Issue 1, ISSN: 2321-9939, 2017.
[17] K. Cabaj and W. Mazurczyk, “Using Software-Defined Networking for ransomware mitigation: The case of cryptoWall”, ISSN: 0890-8044, Vol. 30, No. 6, pp. 14-20, Dec 2016, IEEE.
[18] K.V.G.N. Naidu and P. Sireesha “A Study on WannaCry Ransomware Attack ”, International Journal of recent innovation in engineering and Research.e-ISSN:2456-2084,2017.
[19] Savita Mohurle and manisha Patil, “A brief study of Wannacry Threat: Ransomware Attack 2017”, International Journal of advanced Research in Computer Science, ISSN No: 0976-5697, Vol. 8, No. 5, May 2017.
[20] The computer emergency Response team Mauritius (CERT-MU), “The Petya Cyber-attack”, Whitepaper .June 2017.
[21] Segun I. Popoola, Ujioghosa B. Iyekekpolo, Samuel O. Ojewande, Faith O. Sweerwilliams, Samuel N. John, and Aderemi A. Atayero, “Ransomware: Current Trend, challenges, and Research Directions”, World congress on Engineering and Computer Science, Vol.1, ISSN. 2078-0958, ISBN: 978-988-14047-5-6, Oct 2017, WCECS.
[22] POPOOLA, Segun Isaiah, “Ransomware :Most Recent Threat to Computer Network Security”, 2017 CU EIE Seminar on Computer Network Security, Ota, Covenant University, DOI:10.13140/RG.2.2.31592.67841.
[23] Lucian Constantin, “Researchers Release Free Decryption Tools for Powerware and Bart Ransomware”, PC Word from IDG, July 22, 2016.
[24] S. Zanero and F. M. B, “HELDROID: Dissecting and Detecting Mobile Ransomware ”, pp. 382-404, 2015
[25] Monika, Pavol Zavarsky and Dale Lindskog,“Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization”, International Workshop on Future Information Security, Privacy & Forensics for Complex Systems, ISSN. 1877-0509, doi: 10.1016,2016 ELSEVIER.
[26] Tianliang Lu, Lu Zhang, Shunye Wang and Qi Gong,“Ransomware Detection Based on V-detector Negative Selection Algorithm”, ISBN: 978-1-5386-3016-7, IEEE 2017.
[27] A. K Maurya, N. Kumar, A. Agrawal and R. A. Khan, “Ransomware: Evolution, Target and Safety Measures”, International journal of Computer Science and Engineering, Vol.6, Issue.1,E-ISSN:2347-2693, 2017.
[28] Sanggeun Song, Bongjoon Kim, and Sangjun Lee,Research Article “The Effective ransomware prevention Technique using process Monitoring on Android platform” Vol no 2016, Article Id.2946735 Hindawi Publishing Corporation Mobile Information Systems.
[29] Amin Kharaaz, W. Robertson, D. Balzarotti, L. Bilge, and E. kirda,”Cutting the Gordian knot: A look under the hood of ransomware attacks”, 12th conference on detection of Intrusion and malware &vulnerability Assessment (DIMVA 2015), July 9-10, 2015, Milan Italy.
[30] Dae-Youb Kim, Geun-Yeong Choi, and Ji-Hoon Lee, “White List-based Ransomware Real-time Detection and Prevention for User Device Protection”, ISSN: 978-1-5386-3025-9-18,2018 IEEE.