2020 2nd International Conference on Computer and Information Sciences (ICCIS) 2020
DOI: 10.1109/iccis49240.2020.9257708
|View full text |Cite
|
Sign up to set email alerts
|

Evolution, Mitigation, and Prevention of Ransomware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…There are numerous works where the evolution of ransomware is studied [80][81][82]. An overview of the abovementioned evolution is shown in Figure 4, showing in blue text the most relevant milestones that have given ransomware its current damaging power.…”
Section: Crypto-ransomware Evolutionmentioning
confidence: 99%
“…There are numerous works where the evolution of ransomware is studied [80][81][82]. An overview of the abovementioned evolution is shown in Figure 4, showing in blue text the most relevant milestones that have given ransomware its current damaging power.…”
Section: Crypto-ransomware Evolutionmentioning
confidence: 99%
“…• Ransomware: Ransomware is a very common attack method with the ability to inhibit or restrict the access of users to their system [55]. It also may instruct users to pay a certain amount of ransom using online payment methods [56], which generally would involve the use of virtual currencies like bitcoins, before they could re-access their system or data.…”
Section: Cyber Attacksmentioning
confidence: 99%
“…Ransomware gets into computer networks; through the use of publickey encryption, ransomware encrypts the files, and this encryption key remains with the server of the cybercriminal [56]. Encryption is used by cyber criminals to detain the data, and the data owner has to pay a certain amount of ransom to get the private key [40,43,55,56].…”
Section: Cyber Attacksmentioning
confidence: 99%
“…Additionally, we emphasize the variety of sensors that Internet of Things (IoT) users employ [1]. A ransomware attack employs private key encryption to prevent authorized users from accessing a system or data unless they pay a ransom (cash), typically in Bitcoin [2]. Ransomware operations may include data exfiltration techniques.…”
Section: Introductionmentioning
confidence: 99%