2020
DOI: 10.1007/s12065-020-00502-9
|View full text |Cite
|
Sign up to set email alerts
|

Research perceptions on ransomware attack: a complete analysis on conventional authentication protocols in network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 82 publications
0
6
0
Order By: Relevance
“…This development in cybersecurity prompted the rise of more advanced ransomware variants like Locky and Cerber, which not only employed more sophisticated encryption algorithms but also integrated evasion tactics to circumvent traditional cybersecurity measures [3,7]. Yet, as cyber defenses continued to advance, particularly with the enhancement of backup and recovery solutions, the potency of ransomware relying solely on encryption began to decline [8,9]. This led to a notable transition in the ransomware landscape, where recent trends have witnessed a pivot towards ransomware strategies that prioritize data exfiltration [10,11].…”
Section: Ransomware Evolution and Trendsmentioning
confidence: 99%
See 1 more Smart Citation
“…This development in cybersecurity prompted the rise of more advanced ransomware variants like Locky and Cerber, which not only employed more sophisticated encryption algorithms but also integrated evasion tactics to circumvent traditional cybersecurity measures [3,7]. Yet, as cyber defenses continued to advance, particularly with the enhancement of backup and recovery solutions, the potency of ransomware relying solely on encryption began to decline [8,9]. This led to a notable transition in the ransomware landscape, where recent trends have witnessed a pivot towards ransomware strategies that prioritize data exfiltration [10,11].…”
Section: Ransomware Evolution and Trendsmentioning
confidence: 99%
“…However, more recent trends have indicated a notable shift in the tactics employed by ransomware perpetrators [3,7]. Contemporary ransomware groups, moving beyond the sole reliance on file encryption, are progressively focusing on data exfiltration [8,9]. This progression has been recognized as a significant transformation in the threat landscape posed by ransomware [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it become utmost important to develop an approach for removing and detecting such malware from the systems. A detailed documented study on prevention and perception of conventional authentication is discussed in [5]. In several state of the arts, local and global features have been attempted to cope up by introducing code interchange, null value insertion, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Flooding attacks are detected through the route request time data and end‐to‐end delay 8 . The ransomware attack restricts the users by locking and encrypting the files and predicting through authentication and optimization algorithms 9 . In a man‐in‐the‐middle attack , it enters as a third party in two‐way communication; existing nodes think it is talking to the other 10 .…”
Section: Introductionmentioning
confidence: 99%
“…8 The ransomware attack restricts the users by locking and encrypting the files and predicting through authentication and optimization algorithms. 9 In a man-in-the-middle attack, it enters as a third party in two-way communication; existing nodes think it is talking to the other. 10 Man-in-the-middle attacks detect through the packet time transmission data.…”
Section: Introductionmentioning
confidence: 99%