• E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2021

    5.610

    Impact Factor 2022

    6.247

  • E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2021

    5.610

    Impact Factor 2022

    6.247

  • E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2021

    5.610

    Impact Factor 2022

    6.247

INTERNATIONAL JOURNAL OF INVENTIONS IN ENGINEERING & SCIENCE TECHNOLOGY

International Peer Reviewed (Refereed), Open Access Research Journal
(By Aryavart International University, India)

Paper Details

ATTEMPTING AN IN-DEPTH ANALYSIS OF THE IDENTIFIABLE RANSOMWARE ANALYSIS

Harshit Dua

Galgotias University, Uttar Pradesh, India

60 - 67 Vol. 4, Jan-Dec, 2018
Receiving Date: 2018-08-15;    Acceptance Date: 2018-09-14;    Publication Date: 2018-09-20
Download PDF

Abstract

Ransomware attacks have developed dramatically during the new past to cause significant disturbance in tasks across different businesses, including the public authority. In this research, we will consider windows platforms that get infected by 14 strains of ransomware. We trust Windows Application Programming Interface (API) calls made through ransomware measures with standard working design plan baselines. The assessment perceives and reports notable highlights of ransomware as taken away through the numbers of API calls

Keywords: Attack; Information Segregation; Operating System; Ransomware

    References

  1. Akashdeep Bhardwaj, Dr. GVB Subrahmanyam, Dr. Vinay Avasthi, Dr. Hanumat Sastry (2016) Ransomware digital extortion: a rising new age threat, Indian Journal of Science and Technology, 9,14, 1-5 (2016)
  2. Gavin O’Gorman and Geoff McDonald (2012) Ransomware: A growing menace, Symantec Corporation
  3. Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda (2016) UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware, 25th USENIX Security Symposium USENIX Security 16), (2016), 757–772, USENIX Association
  4. Krzysztof Cabaj, Marcin Gregorczyk and Wojciech Mazurczyk (2018) Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics, Computers & Electrical Engineering, 66, 353–368, Elsevier
  5. Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Kim-Kwang Raymond Choo (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint, Journal of Ambient Intelligence and Humanized Computing, 9(4), pp 1141–1152, Springer
  6. Akashdeep Bhardwaj, Dr. GVB Subrahmanyam, Dr. Vinay Avasthi, Dr. Hanumat Sastry (2016) Ransomware digital extortion: a rising new age threat, Indian Journal of Science and Technology, 9,14, 1-5 (2016)
  7. Ross Brewer (2016) Ransomware attacks: detection, prevention, and cure, Network Security, 9, 5–9, Elsevier
  8. Eugene Kolodenker, William Koch, Gianluca Stringhini and Manuel Egele (2017) PayBreak: defense against cryptographic ransomware, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 599–611, (2017), ACM
  9. Richardson, Ronny, and North, Max M (2017) Ransomware: Evolution, mitigation, and prevention, International Management Review, 13, 1, 10, (2017)
  10. Sanggeun Song, Bongjoon Kim, and Sangjun Lee (2016). The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform. Mobile Information Systems, Volume 2016, Article ID 2946735, 9 pages, http://dx.doi.org/10.1155/2016/2946735
  11. Jinal P. Tailor and Ashish D. Patel (2017) A Comprehensive Survey: Ransomeware Attacks Prevention, Monitoring, and Damage Control, International Journal of Research and Scientific Innovation (IJRSI IV(VIS), pp 116-121
Back