2021
DOI: 10.1007/978-3-030-90370-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…This spurred development of more realistic, highinteraction honeypots mimicking valuable documents or databases [53]. These decoys engage threats in more prolonged interactions to delay encryption and enable incident response [54]. Experiments have shown such decoys can detect threats early in attack chains before significant damage occurs [55,56].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
“…This spurred development of more realistic, highinteraction honeypots mimicking valuable documents or databases [53]. These decoys engage threats in more prolonged interactions to delay encryption and enable incident response [54]. Experiments have shown such decoys can detect threats early in attack chains before significant damage occurs [55,56].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
“…We remark that our paper adds to a growing literature using game theory to analyse the ransomware decision process [4,5,9,13]. Prior game-theoretical studies have focused on the interaction of ransomware and victim's decision to invest in security measures like backups or insurance [2,32,36,38]. For instance, Laszka, Farhang and Grossklags [17] focused on modeling the ransomware ecosystem as a whole and how backup decisions affect the ransomware ecosystem.…”
Section: Introductionmentioning
confidence: 97%
“…The last decade has seen a rapid rise in crypto-ransomware attacks impacting individuals, businesses, charities and public organisations [7,8,11,26,27,31]. Crypto-ransomware, or ransomware for short, is broadly defined as the use of crypto-techniques to encrypt the files of a victim, after which the attackers ask for a ransom to decrypt the files [23,38]. Ransomware has proved highly profitable for criminal gangs, primarily because many victims pay the ransom in order to receive the decryption keys [25,29].…”
Section: Introductionmentioning
confidence: 99%
“…In 2023, it was estimated that 91% of ransomware attacks involved some form of data exfiltration, highlighting a significant shift in attacker tactics [12,13,3]. This change represents a move from merely causing data inaccessibility to directly leveraging data breaches as a tool for extortion [14,11,15,16], reflecting an evolution in ransomware strategy that increasingly prioritizes data leverage over mere data denial [17,18].…”
Section: Introductionmentioning
confidence: 99%