Study on Prevention and Solution of Ransomware Attack

Authors

  • Yan Lin Tiu Universiti Utara Malaysia
  • Mohamad Fadli Zolkipli Universiti Utara Malaysia

DOI:

https://doi.org/10.33736/jita.3402.2021

Keywords:

malware, ransomware, prevention, prevention approach, solution

Abstract

The development of science and technology in this era brought many advantages for peoples, organizations, enterprises, and companies merely a lot of cyber threats are occurring nowadays. Ransomware is one of the families of malicious software that spread quickly and cause a critical impact around the world. Ransomware attacks the victim by infecting the malicious file into the device; they will encrypt and deny the victim to access it. A ransom demand message will prompt the user so that they will gain the money anonymously. The victims are only allowed to access after pay the demand using crypto-currencies such as Bitcoin. There is a lot of reason that cause the ransomware attack around the world, for example, the vulnerability of the system. Otherwise, the weaknesses of security knowledge also become one of the causes. However, many preventions allow the user to avoid the ransomware propagate but the system is not fully free from the ransomware attack. Thus, a lot of solutions are giving out by the researcher to overcome the problem after the attack.

References

Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10.
Paul III, D. P., Spence, N., Bhardwa, N., & PH, C. D. (2018). Healthcare Facilities: Another Target for Ransomware Attacks.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Applied clinical informatics, 7(2), 624. Krause,
Tamburello, L., Mulvaney, M. D., & Carpenter, L. L. P. (2017). Your Money or Your Data: Ransomware and Modern Health Information Technology.
Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938-1940.
Aurangzeb, S., Aleem, M., Iqbal, M. A., & Islam, M. A. (2017). Ransomware: a survey and trends. Journal of Information Assurance & Security, 6(2), 48-58.
Byrne, D., & Thorpe, C. (2017, June). Jigsaw: an investigation and countermeasure for ransomware attacks. In European Conference on Cyber Warfare and Security (pp. 656-665). Academic Conferences International Limited.
Shah, N., & Farik, M. (2017). Ransomware-Threats Vulnerabilities and Recommendations. International Journal of Scientific & Technology Research, 6(06), 307-309.
Mohammad, A. H. (2020). Ransomware evolution, growth and recommendation for detection. Modern Appl. Sci, 14(3).
Maurya, A. K., Kumar, N., Agrawal, A., & Khan, R. A. (2018). Ransomware: Evolution, target and safety measures. International Journal of Computer Sciences and Engineering, 6(1), 80-85.
Humayun, M., Jhanjhi, N. Z., Alsayat, A., & Ponnusamy, V. (2020). Internet of things and ransomware: evolution, mitigation and prevention. Egyptian Informatics Journal.
Alam, M., Sinha, S., Bhattacharya, S., Dutta, S., Mukhopadhyay, D., & Chattopadhyay, A. (2020). Rapper: Ransomware prevention via performance counters. arXiv preprint arXiv:2004.01712.
Aurangzeb, S., Rais, R. N. B., Aleem, M., Islam, M. A., & Iqbal, M. A. (2021). On the classification of Microsoft-Windows ransomware using hardware profile. PeerJ Computer Science, 7, e361.
Lee, S., Park, M., & Kim, J. (2021). Magniber v2 Ransomware Decryption: Exploiting the Vulnerability of a Self-Developed Pseudo Random Number Generator. Electronics, 10(1), 16.
Alshaikh, H., Ramadan, N., & Hefny, H. A. (2020). Ransomware Prevention and Mitigation Techniques. International Journal of Computer Applications, 975, 8887.
Zetter, K. (2016). 4 ways to protect against the very real threat of Ransomware. Retrieved from Security, http://www.wired.com/2016/05/4-ways-protect-ransomware-youre-targe
Narain, P. (2018). Ransomware-Rising Menace to an Unsuspecting Cyber Audience (Doctoral dissertation).
Ashwin, K. H., Deepika, S., Priyanka, G. A, & Bindinganavalle, N. (2019). Detecting Zero Day Malware. International Journal of Engineering Research & Technology (IJERT), 8(05), 591–595.
Morris, J., Lin, D., & Smith, M. (2021). Fight Virus Like a Virus: A New Defense Method Against File-Encrypting Ransomware. arXiv preprint arXiv:2103.11014.
Nardone, V., Santone, A., & Visaggio, C. A. (2016). Ransomware Steals your Phone. Formal Methods Rescue it.

Downloads

Published

2021-12-13

How to Cite

Tiu, Y. L., & Zolkipli, M. F. (2021). Study on Prevention and Solution of Ransomware Attack. Journal of IT in Asia, 9(1), 133–139. https://doi.org/10.33736/jita.3402.2021

Issue

Section

Articles