Study on Prevention and Solution of Ransomware Attack
DOI:
https://doi.org/10.33736/jita.3402.2021Keywords:
malware, ransomware, prevention, prevention approach, solutionAbstract
The development of science and technology in this era brought many advantages for peoples, organizations, enterprises, and companies merely a lot of cyber threats are occurring nowadays. Ransomware is one of the families of malicious software that spread quickly and cause a critical impact around the world. Ransomware attacks the victim by infecting the malicious file into the device; they will encrypt and deny the victim to access it. A ransom demand message will prompt the user so that they will gain the money anonymously. The victims are only allowed to access after pay the demand using crypto-currencies such as Bitcoin. There is a lot of reason that cause the ransomware attack around the world, for example, the vulnerability of the system. Otherwise, the weaknesses of security knowledge also become one of the causes. However, many preventions allow the user to avoid the ransomware propagate but the system is not fully free from the ransomware attack. Thus, a lot of solutions are giving out by the researcher to overcome the problem after the attack.
References
Paul III, D. P., Spence, N., Bhardwa, N., & PH, C. D. (2018). Healthcare Facilities: Another Target for Ransomware Attacks.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Applied clinical informatics, 7(2), 624. Krause,
Tamburello, L., Mulvaney, M. D., & Carpenter, L. L. P. (2017). Your Money or Your Data: Ransomware and Modern Health Information Technology.
Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938-1940.
Aurangzeb, S., Aleem, M., Iqbal, M. A., & Islam, M. A. (2017). Ransomware: a survey and trends. Journal of Information Assurance & Security, 6(2), 48-58.
Byrne, D., & Thorpe, C. (2017, June). Jigsaw: an investigation and countermeasure for ransomware attacks. In European Conference on Cyber Warfare and Security (pp. 656-665). Academic Conferences International Limited.
Shah, N., & Farik, M. (2017). Ransomware-Threats Vulnerabilities and Recommendations. International Journal of Scientific & Technology Research, 6(06), 307-309.
Mohammad, A. H. (2020). Ransomware evolution, growth and recommendation for detection. Modern Appl. Sci, 14(3).
Maurya, A. K., Kumar, N., Agrawal, A., & Khan, R. A. (2018). Ransomware: Evolution, target and safety measures. International Journal of Computer Sciences and Engineering, 6(1), 80-85.
Humayun, M., Jhanjhi, N. Z., Alsayat, A., & Ponnusamy, V. (2020). Internet of things and ransomware: evolution, mitigation and prevention. Egyptian Informatics Journal.
Alam, M., Sinha, S., Bhattacharya, S., Dutta, S., Mukhopadhyay, D., & Chattopadhyay, A. (2020). Rapper: Ransomware prevention via performance counters. arXiv preprint arXiv:2004.01712.
Aurangzeb, S., Rais, R. N. B., Aleem, M., Islam, M. A., & Iqbal, M. A. (2021). On the classification of Microsoft-Windows ransomware using hardware profile. PeerJ Computer Science, 7, e361.
Lee, S., Park, M., & Kim, J. (2021). Magniber v2 Ransomware Decryption: Exploiting the Vulnerability of a Self-Developed Pseudo Random Number Generator. Electronics, 10(1), 16.
Alshaikh, H., Ramadan, N., & Hefny, H. A. (2020). Ransomware Prevention and Mitigation Techniques. International Journal of Computer Applications, 975, 8887.
Zetter, K. (2016). 4 ways to protect against the very real threat of Ransomware. Retrieved from Security, http://www.wired.com/2016/05/4-ways-protect-ransomware-youre-targe
Narain, P. (2018). Ransomware-Rising Menace to an Unsuspecting Cyber Audience (Doctoral dissertation).
Ashwin, K. H., Deepika, S., Priyanka, G. A, & Bindinganavalle, N. (2019). Detecting Zero Day Malware. International Journal of Engineering Research & Technology (IJERT), 8(05), 591–595.
Morris, J., Lin, D., & Smith, M. (2021). Fight Virus Like a Virus: A New Defense Method Against File-Encrypting Ransomware. arXiv preprint arXiv:2103.11014.
Nardone, V., Santone, A., & Visaggio, C. A. (2016). Ransomware Steals your Phone. Formal Methods Rescue it.
Downloads
Published
How to Cite
Issue
Section
License
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarize, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.