Ransomware detection using machine learning algorithms

Author: Bae, Seong Il; Lee, Gyu Bin; Im, Eul Gyu Description: The number of ransomware variants has increased rapidly every year, and ransomware needs to be distinguished from the other types of malware to protect users’ machines from ransomware-based attacks. Ransomware is similar to other types of malware in some aspects, but other characteristics are clearly different. For example, ransomware generally conducts a large number of file-related operations in a short period of time to lock or to encrypt files of a victim’s machine. The signature-based malware detection methods, which…

See more and a link to full text

Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms

Author: Maigida, Abdullahi Mohammed; Abdulhamid, Shafi’i Muhammad; Olalere, Morufu; Alhassan, John K.; Chiroma, Haruna; Dada, Emmanuel Gbenga Description: Ransomware is advanced and upgraded malicious software which comes in the forms of Crypto or Locker, with the intention to attack and take control of basic infrastructures and computer systems. The vast majority of these threats are aimed at directly or indirectly making money from the victims by asking for a ransom in exchange for decryption keys. This systematic literature analysed the anatomy of ransomware, including its trends and mode of attacks…

See more and a link to full text

Understanding the Evolution of Ransomware: Paradigm Shifts in Attack Structures

Author: Zimba, Aaron; Chishimba, Mumbi Description: The devasting effects of ransomware have continued to grow over the past two decades which have seen ransomware shift from just being opportunistic attacks to carefully orchestrated attacks. Individuals and business organizations alike have continued to fall prey to ransomware where victims have been forced to pay cybercriminals even up to $1 million in a single attack whilst others have incurred losses in hundreds of millions of dollars. Clearly, ransomware is an emerging cyber threat to enterprise systems that can no longer be ignored….

See more and a link to full text

Phishing Evolves: Analyzing the Enduring Cybercrime

Author: Ghazi-Tehrani, Adam Kavon; Pontell, Henry N. Description: Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via electronic communication, has quickly evolved beyond low-skill schemes that relied on casting “a wide net.” Spear phishing attacks target a particular high-value individual utilizing sophisticated techniques. This study aims to describe the current state of phishing, the expected technological advances and developments of the near future, and the best prevention and enforcement strategies. Data comes from interviews with approximately 60 information technology security professionals, “hackers,” and…

See more and a link to full text
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.