DS Journal of Digital Science and Technology (DS-DST)

Research Article | Open Access | Download Full Text

Volume 1 | Issue 1 | Year 2022 | Article Id: DST-V1I1P101 DOI: https://doi.org/10.59232/DST-V1I1P101

Detection and Prevention of Ransomware Attacks using AES and RSA Algorithms

K. Raja

ReceivedRevisedAcceptedPublished
30 Mar 202213 Jun 202221 Jun 202207 Jul 2022

Citation

K. Raja. “Detection and Prevention of Ransomware Attacks using AES and RSA Algorithms.” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 1-9, 2022.

Abstract

At the moment network security is the vital role for all the administrations and also for the government offices. Ransomware attack is one of the most widespreadattacker in grid or network environment and increasing the every year very heavily. This ransomware attack is the blackmail based attack and it locks the victim users of source of content and demands the money to release. Over the last rare years many number of high profile ransomware attackers are observing here. in this paper we proposed the detection and prevention technique using advanced encryption standard algorithm from Ransomware attack. It is very difficult to recover the information which is attacked using cryptographic based approaches. It will show to reduce the network traffic and increases the efficiency whenever compare to proposed approaches.

Keywords

Ransomware attacks, Detection, Prevention, AES and RSA Cryptographic algorithms

References

[1] Xin Luo, and Qinyu Liao, “Awareness Education as the Key to Ransomware Prevention,” Information Systems Security, vol. 16, no. 4, pp. 195-202, 2007.

[CrossRef] [Google Scholar] [Publisher Link]

[2] Amin Kharraz et al., “Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks,” Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 3-24, 2015.

[CrossRef] [Google Scholar] [Publisher Link]

[3] Philip O'Kane, Sakir Sezer, and Domhnall Carlin, “Evolution of Ransomware,” IET Networks, vol. 7, no. 5, pp. 321-327, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Alexander Gostev et al., "It Threat Evolution in Q1 2016," Kaspersky Lab, 2016.

[5] U.S. Depatment of Justice, I-062315-PSA, “Criminals Continue to Defraud and Extort Funds from Victims Using Cryptowall Ransomware Schemes,” 2015.

[Google Scholar]

[6] SH Kok et al., "Ransomware, Threat and Detection Techniques: A Review,” International Journal of Computer Science and Network Security, vol. 19, no. 2, pp. 136-146, 2019.

[Google Scholar] [Publisher Link]

[7] R. Surendiran, and K. Alagarsamy, "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp. 2217-2224, 2013.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Peter D. Haas, "Ransomware Goes Mobile: An Analysis of the Threats Posed by Emerging Methods,” Proquest LLC, New Jersey, 2015.

[Google Scholar] [Publisher Link]

[9] Helen Jose Chittooparambil et al., "A Review of Ransomware Families and Detection Methods,” Advances in Intelligent Systems and Computing, pp. 588-597, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[10] Monika, Pavol Zavarsky, and Dale Lindskog, "Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization,” Procedia Computer Science, vol. 94, pp. 465-472, 2016.

[CrossRef] [Google Scholar] [Publisher Link]

[11] Nolen Scaife et al., "Cryptolock (and Drop It): Stopping Ransomware Attacks on User Data,” 2016 IEEE 36th International Conference on Distributed Computing Systems, pp. 303-312, 2016.

[CrossRef] [Google Scholar] [Publisher Link]

[12] J. Scott, and D. Spaniel, “The ICIT Ransomware Report,” 2016.

[13] Ross Brewer, “Ransomware Attacks: Detection, Prevention and Cure,” Network Security, vol. 2016, no. 9, pp. 5-9, 2016. [CrossRef]

[Google Scholar] [Publisher Link]

[14] Ibrar Yaqoob et al., "The Rise of Ransomware and Emerging Security Challenges in the Internet of Things,” Computer Networks, vol. 129, pp. 444-458, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

[15] Sumith Maniath, Prabaharan Poornachandran, and V. G. Sujadevi, “Survey on Prevention, Mitigation and Containment of Ransomware Attacks,” Communications in Computer and Information Science, pp. 39-52, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[16] R. Surendiran, and K. Alagarsamy, “A Crtitical Approach for Intruder Detection in Mobile Devices,” SSRG International Journal of Computer Science and Engineering, vol. 1, no. 4, pp. 6-14, 2014.

[CrossRef] [Publisher Link]

[17] Ronny Richardson, and Max M. North, "Ransomware: Evolution, Mitigation and Prevention,” International Management Review, vol. 13, no. 1, pp. 10-20, 2017.

[Google Scholar]

[18] L. Constantin, “Widespread Exploit Kit, Ransomware Program, and Password Stealer Mixed Into Dangerous Malware Cocktail,” Pcworld, 2015.

[19] Daniele Sgandurra et al., "Automated Dynamic Analysis of Ransomware: Benefits, Limitations and Use for Detection,” pp. 2-4, 2016.

[Google Scholar]

[20] S. Gavaskar, R. Surendiran, and E. Ramaraj, “Three Counter Defense Mechanism for TCP SYN Flooding Attacks,” International Journal of Computer Applications, vol. 6, no. 6, pp. 12-15, 2010.

[CrossRef] [Google Scholar] [Publisher Link]

[21] Shweta Sharma, Rakesh Kumar, and C. Rama Krishna, “Ransom Analysis: the Evolution and Investigation of Android Ransomware,” Proceedings of International Conferenceon IotInclusive Life (ICIIL 2019), NITTTR Chandigarh, India, pp. 33-41, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[22] Daniel Gonzalez, and Thaier Hayajneh, "Detection and Prevention of Crypto Ransomware,” 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, pp. 472-478, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

[23] Steve Mansfield-Devine, “Ransomware: Taking Businesses Hostage,” Network Security, vol. 2016, no. 10, pp. 8-17, 2016.

[CrossRef] [Google Scholar] [Publisher Link]

[24] Sharifah Yaqoub A. Fayi, “What Petya/Notpetya Ransomware is and What Its Remidiationsare,” Advances in Intelligent Systems and Computing, pp. 93-100, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[25] R. Surendiran, and K. Alagarsamy, "A Novel Tree Based Security Approach for Smart Phones," International Journal of Computer Trends and Technology, vol. 3, no. 6, pp. 787-792, 2012.

[CrossRef] [Google Scholar] [Publisher Link]

[26] Juan A. Herrera Silva et al., "A Survey on Situational Awareness of Ransomware Attacks—Detection and Prevention Parameters," Remote Sensing, vol. 11, no. 10, p. 1168, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[27] S. Gavaskar, E. Ramaraj, and R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,” International Journal of Computer Science and Network Security, vol. 12, no. 11, pp. 137-140, 2012.

[Google Scholar] [Publisher Link]

[28] J. Petters, “Cerber Ransomware: What You Need to Know Varonis,” Inside Out Security, 2020. [Online]. Available: https://www.varonis.com/blog/cerberransomware/

[29] Aaron Zimba, Luckson Simukonda, and Mumbi Chishimba, “Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of Wannacry for Network and Information Security,” Zambia ICT Journal, vol. 1, no. 1, pp. 35-40, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

[30] Maxat Akbanov, Vassilios G. Vassilakis, and Michael D. Logothetis, “WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms,” Journal of Telecommunications and Information Technology, vol. 1, pp. 113-124, 2019.

[CrossRef] [Google Scholar]

[31] Kenneth Kraszewski, "SamSam and the Silent Battle of Atlanta," 2019 11th International Conference on Cyber Conflict, pp. 1-16, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[32] Zimbaand M. Chishimba, "Understanding the Evolution of Ransomware: Paradigm Shifts in Attack Structures,”International Journal of Computer Network and Information Security, vol. 11, no. 1, pp. 26-39, 2019. [CrossRef] [Google Scholar] [Publisher Link

[33] Axel Wirth, "The Times They are A-Changin': Part One,” Biomedical Instrumentation & Technology, vol. 52, no. 2, pp. 148-152, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[34] "Samsam Ransomware Campaigns,” Secureworks.Com, [Online]. Available: https://www.secureworks.com/research/samsamransomware-campaigns

[35] Zimbaand M. Chishimba, "On the Economic Impact of Crypto-Ransomware Attacks: the State of the Art on Enterprise Systems," European Journal for Security Research, vol. 4, no. 1, pp. 3-31, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[36] M. Midler, K. O‘Meara, and A. Parisi, “Current Ransomware Threats,” Carnegie Mellon University, 2020.

[37] J. Schultz, "Sodinokibi Ransomware Exploits Weblogic Server Vulnerability,” Blog.Talosintelligence.Com, 2020. [Online]. Available: https://blog.talosintelligence.com/2019/04/Sodinokibiransomware-Exploits-Weblogic.html

[38] L. Tung, “VPN Warning: Revil Ransomware Targets Unpatched Pulse Secure VPN Servers Zdnet,” Zdnet, 2020. [Online]. Available: https://www.zdnet.com/Article/Vpn-Warning-Revilransomware-Targets-Unpatched-Pulse-Secure-Vpnservers/

Detection and Prevention of Ransomware Attacks using AES and RSA Algorithms