2021
DOI: 10.1016/j.eij.2020.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Internet of things and ransomware: Evolution, mitigation and prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
62
0
3

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 142 publications
(65 citation statements)
references
References 78 publications
0
62
0
3
Order By: Relevance
“…Urquhart and Mcauley [38] offered a method for risks lying for IIoT drawn both on the perspectives of technical and regulatory. Humayun et al [39] showed a wide-ranging description of the growth, prevention, and moderation of Ransomware in the background of IoT. Dachyar et al [40] presented a comprehensive detail of the 26420 articles published in the IoT field.…”
Section: Analysis Of the Dss For Iiot Based On Popular Librariesmentioning
confidence: 99%
“…Urquhart and Mcauley [38] offered a method for risks lying for IIoT drawn both on the perspectives of technical and regulatory. Humayun et al [39] showed a wide-ranging description of the growth, prevention, and moderation of Ransomware in the background of IoT. Dachyar et al [40] presented a comprehensive detail of the 26420 articles published in the IoT field.…”
Section: Analysis Of the Dss For Iiot Based On Popular Librariesmentioning
confidence: 99%
“…There are basically four types of ransomware namely, Crypto ransomware, Locker ransomware, Leakware and Scareware [1,7,10,16,17]. Crypto ransomware attacks the victim machine through different attack vectors and encrypts valuable files and makes them not to accessible to the user and demands ransom to decrypt the file.…”
Section: Types Of Ransomwarementioning
confidence: 99%
“…After researching with many articles, ransomware white papers and online resources [1,7,[23][24][25][26][27], we came out with seven stages of ransomware attack. This seven-stage ransomware attack is shown below in Fig.…”
Section: Ransomware Attack Stagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Because all IoT data is stored in a IoT 2021, 2 relatively "single" location, it eases the hackers' attempt to find targets for their attacks. They will be most likely to attack the Cloud environment by stealing the data [4] or disrupt their operations through ransomware [5].…”
Section: Introductionmentioning
confidence: 99%