Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2022 | Article Id: DST-V1I1P101 DOI: https://doi.org/10.59232/DST-V1I1P101
Detection and Prevention of Ransomware Attacks using AES and RSA Algorithms
K. Raja
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 30 Mar 2022 | 13 Jun 2022 | 21 Jun 2022 | 07 Jul 2022 |
Citation
K. Raja. “Detection and Prevention of Ransomware Attacks using AES and RSA Algorithms.” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 1-9, 2022.
Abstract
Keywords
Ransomware attacks, Detection, Prevention, AES and RSA Cryptographic algorithms
References
[1] Xin Luo, and Qinyu Liao, “Awareness Education as the Key to Ransomware Prevention,” Information Systems Security, vol. 16, no. 4, pp. 195-202, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Amin Kharraz et al., “Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks,” Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 3-24, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Philip O'Kane, Sakir Sezer, and Domhnall Carlin, “Evolution of Ransomware,” IET Networks, vol. 7, no. 5, pp. 321-327, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Alexander Gostev et al., "It Threat Evolution in Q1 2016," Kaspersky Lab, 2016.
[5] U.S. Depatment of Justice, I-062315-PSA, “Criminals Continue to Defraud and Extort Funds from Victims Using Cryptowall Ransomware Schemes,” 2015.
[6] SH Kok et al., "Ransomware, Threat and Detection Techniques: A Review,” International Journal of Computer Science and Network Security, vol. 19, no. 2, pp. 136-146, 2019.
[Google Scholar] [Publisher Link]
[7] R. Surendiran, and K. Alagarsamy, "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp. 2217-2224, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Peter D. Haas, "Ransomware Goes Mobile: An Analysis of the Threats Posed by Emerging Methods,” Proquest LLC, New Jersey, 2015.
[Google Scholar] [Publisher Link]
[9] Helen Jose Chittooparambil et al., "A Review of Ransomware Families and Detection Methods,” Advances in Intelligent Systems and Computing, pp. 588-597, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Monika, Pavol Zavarsky, and Dale Lindskog, "Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization,” Procedia Computer Science, vol. 94, pp. 465-472, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Nolen Scaife et al., "Cryptolock (and Drop It): Stopping Ransomware Attacks on User Data,” 2016 IEEE 36th International Conference on Distributed Computing Systems, pp. 303-312, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[12] J. Scott, and D. Spaniel, “The ICIT Ransomware Report,” 2016.
[13] Ross Brewer, “Ransomware Attacks: Detection, Prevention and Cure,” Network Security, vol. 2016, no. 9, pp. 5-9, 2016. [CrossRef]
[Google Scholar] [Publisher Link]
[14] Ibrar Yaqoob et al., "The Rise of Ransomware and Emerging Security Challenges in the Internet of Things,” Computer Networks, vol. 129, pp. 444-458, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Sumith Maniath, Prabaharan Poornachandran, and V. G. Sujadevi, “Survey on Prevention, Mitigation and Containment of Ransomware Attacks,” Communications in Computer and Information Science, pp. 39-52, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[16] R. Surendiran, and K. Alagarsamy, “A Crtitical Approach for Intruder Detection in Mobile Devices,” SSRG International Journal of Computer Science and Engineering, vol. 1, no. 4, pp. 6-14, 2014.
[17] Ronny Richardson, and Max M. North, "Ransomware: Evolution, Mitigation and Prevention,” International Management Review, vol. 13, no. 1, pp. 10-20, 2017.
[18] L. Constantin, “Widespread Exploit Kit, Ransomware Program, and Password Stealer Mixed Into Dangerous Malware Cocktail,” Pcworld, 2015.
[19] Daniele Sgandurra et al., "Automated Dynamic Analysis of Ransomware: Benefits, Limitations and Use for Detection,” pp. 2-4, 2016.
[20] S. Gavaskar, R. Surendiran, and E. Ramaraj, “Three Counter Defense Mechanism for TCP SYN Flooding Attacks,” International Journal of Computer Applications, vol. 6, no. 6, pp. 12-15, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Shweta Sharma, Rakesh Kumar, and C. Rama Krishna, “Ransom Analysis: the Evolution and Investigation of Android Ransomware,” Proceedings of International Conferenceon IotInclusive Life (ICIIL 2019), NITTTR Chandigarh, India, pp. 33-41, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Daniel Gonzalez, and Thaier Hayajneh, "Detection and Prevention of Crypto Ransomware,” 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, pp. 472-478, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Steve Mansfield-Devine, “Ransomware: Taking Businesses Hostage,” Network Security, vol. 2016, no. 10, pp. 8-17, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Sharifah Yaqoub A. Fayi, “What Petya/Notpetya Ransomware is and What Its Remidiationsare,” Advances in Intelligent Systems and Computing, pp. 93-100, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[25] R. Surendiran, and K. Alagarsamy, "A Novel Tree Based Security Approach for Smart Phones," International Journal of Computer Trends and Technology, vol. 3, no. 6, pp. 787-792, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Juan A. Herrera Silva et al., "A Survey on Situational Awareness of Ransomware Attacks—Detection and Prevention Parameters," Remote Sensing, vol. 11, no. 10, p. 1168, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[27] S. Gavaskar, E. Ramaraj, and R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,” International Journal of Computer Science and Network Security, vol. 12, no. 11, pp. 137-140, 2012.
[Google Scholar] [Publisher Link]
[28] J. Petters, “Cerber Ransomware: What You Need to Know Varonis,” Inside Out Security, 2020. [Online]. Available: https://www.varonis.com/blog/cerberransomware/
[29] Aaron Zimba, Luckson Simukonda, and Mumbi Chishimba, “Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of Wannacry for Network and Information Security,” Zambia ICT Journal, vol. 1, no. 1, pp. 35-40, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Maxat Akbanov, Vassilios G. Vassilakis, and Michael D. Logothetis, “WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms,” Journal of Telecommunications and Information Technology, vol. 1, pp. 113-124, 2019.
[31] Kenneth Kraszewski, "SamSam and the Silent Battle of Atlanta," 2019 11th International Conference on Cyber Conflict, pp. 1-16, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Zimbaand M. Chishimba, "Understanding the Evolution of Ransomware: Paradigm Shifts in Attack Structures,”International Journal of Computer Network and Information Security, vol. 11, no. 1, pp. 26-39, 2019. [CrossRef] [Google Scholar] [Publisher Link]
[33] Axel Wirth, "The Times They are A-Changin': Part One,” Biomedical Instrumentation & Technology, vol. 52, no. 2, pp. 148-152, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[34] "Samsam Ransomware Campaigns,” Secureworks.Com, [Online]. Available: https://www.secureworks.com/research/samsamransomware-campaigns
[35] Zimbaand M. Chishimba, "On the Economic Impact of Crypto-Ransomware Attacks: the State of the Art on Enterprise Systems," European Journal for Security Research, vol. 4, no. 1, pp. 3-31, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[36] M. Midler, K. O‘Meara, and A. Parisi, “Current Ransomware Threats,” Carnegie Mellon University, 2020.
[37] J. Schultz, "Sodinokibi Ransomware Exploits Weblogic Server Vulnerability,” Blog.Talosintelligence.Com, 2020. [Online]. Available: https://blog.talosintelligence.com/2019/04/Sodinokibiransomware-Exploits-Weblogic.html
[38] L. Tung, “VPN Warning: Revil Ransomware Targets Unpatched Pulse Secure VPN Servers Zdnet,” Zdnet, 2020. [Online]. Available: https://www.zdnet.com/Article/Vpn-Warning-Revilransomware-Targets-Unpatched-Pulse-Secure-Vpnservers/