2018 International Conference on Computing, Networking and Communications (ICNC) 2018
DOI: 10.1109/iccnc.2018.8390376
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The investigation into the existence of a "kill switch" within ransomware, a mechanism purposefully crafted to discontinue the attack under specific scenarios, has also been a focal point [11,13]. An additional area of significant interest has been the detection of sandbox environments; a considerable number of ransomware variants are designed to detect such virtualized environments as a means to elude analysis [14,15,41]. The process of encrypting files located on network drives has garnered notable attention, as this requires ransomware to execute conspicuous network operations [2,16].…”
Section: Previous Approaches In Ransomware Network Traffic Analysismentioning
confidence: 99%
“…The investigation into the existence of a "kill switch" within ransomware, a mechanism purposefully crafted to discontinue the attack under specific scenarios, has also been a focal point [11,13]. An additional area of significant interest has been the detection of sandbox environments; a considerable number of ransomware variants are designed to detect such virtualized environments as a means to elude analysis [14,15,41]. The process of encrypting files located on network drives has garnered notable attention, as this requires ransomware to execute conspicuous network operations [2,16].…”
Section: Previous Approaches In Ransomware Network Traffic Analysismentioning
confidence: 99%
“…A final aspect that needs to be configured concerns backup policies. The backups must guarantee that they can be restored quickly, minimising data loss in the event of disasters and protecting as far as possible against cyber-attacks [51]. Various parameters must be defined for data backup in the architecture described, which differ according to the service analysed.…”
Section: Backupmentioning
confidence: 99%
“…A final aspect that needs to be configured concerns backup policies. The backups must guarantee that they can be restored quickly, minimising data loss in the event of disasters and protecting as far as possible against cyber-attacks [57]. Various parameters must be defined for data backup in the architecture described, which differ according to the service analysed.…”
Section: Backupmentioning
confidence: 99%