ATTEMPTING AN IN-DEPTH ANALYSIS OF THE IDENTIFIABLE RANSOMWARE ANALYSIS
Harshit Dua
Galgotias University, Uttar Pradesh, India
Download PDFAbstract
Ransomware attacks have developed dramatically during the new past to cause significant disturbance in tasks across different businesses, including the public authority. In this research, we will consider windows platforms that get infected by 14 strains of ransomware. We trust Windows Application Programming Interface (API) calls made through ransomware measures with standard working design plan baselines. The assessment perceives and reports notable highlights of ransomware as taken away through the numbers of API calls
Keywords: Attack; Information Segregation; Operating System; Ransomware
- Akashdeep Bhardwaj, Dr. GVB Subrahmanyam, Dr. Vinay Avasthi, Dr. Hanumat Sastry (2016) Ransomware digital extortion: a rising new age threat, Indian Journal of Science and Technology, 9,14, 1-5 (2016)
- Gavin O’Gorman and Geoff McDonald (2012) Ransomware: A growing menace, Symantec Corporation
- Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda (2016) UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware, 25th USENIX Security Symposium USENIX Security 16), (2016), 757–772, USENIX Association
- Krzysztof Cabaj, Marcin Gregorczyk and Wojciech Mazurczyk (2018) Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics, Computers & Electrical Engineering, 66, 353–368, Elsevier
- Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Kim-Kwang Raymond Choo (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint, Journal of Ambient Intelligence and Humanized Computing, 9(4), pp 1141–1152, Springer
- Akashdeep Bhardwaj, Dr. GVB Subrahmanyam, Dr. Vinay Avasthi, Dr. Hanumat Sastry (2016) Ransomware digital extortion: a rising new age threat, Indian Journal of Science and Technology, 9,14, 1-5 (2016)
- Ross Brewer (2016) Ransomware attacks: detection, prevention, and cure, Network Security, 9, 5–9, Elsevier
- Eugene Kolodenker, William Koch, Gianluca Stringhini and Manuel Egele (2017) PayBreak: defense against cryptographic ransomware, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 599–611, (2017), ACM
- Richardson, Ronny, and North, Max M (2017) Ransomware: Evolution, mitigation, and prevention, International Management Review, 13, 1, 10, (2017)
- Sanggeun Song, Bongjoon Kim, and Sangjun Lee (2016). The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform. Mobile Information Systems, Volume 2016, Article ID 2946735, 9 pages, http://dx.doi.org/10.1155/2016/2946735
- Jinal P. Tailor and Ashish D. Patel (2017) A Comprehensive Survey: Ransomeware Attacks Prevention, Monitoring, and Damage Control, International Journal of Research and Scientific Innovation (IJRSI IV(VIS), pp 116-121