2023
DOI: 10.1109/access.2023.3268535
|View full text |Cite
|
Sign up to set email alerts
|

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions

Abstract: The proliferation of ransomware has become a significant threat to cybersecurity in recent years, causing significant financial, reputational, and operational damage to individuals and organizations. This paper aims to provide a comprehensive overview of the evolution of ransomware, its taxonomy, and its state-of-the-art research contributions. We begin by tracing the origins of ransomware and its evolution over time, highlighting the key milestones and major trends. Next, we propose a taxonomy of ransomware t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(23 citation statements)
references
References 143 publications
(164 reference statements)
0
18
0
Order By: Relevance
“…Computers and internet bots are digital tools that can be used for both useful cyber services and bad cyberattacks [72]. Malware bots and internet bots can be programmed or hacked to infiltrate user accounts, systematically search the internet for contact information, send spam, restrict access, or carry out other malicious activities, both locally and globally.…”
Section: Data Software Modelmentioning
confidence: 99%
“…Computers and internet bots are digital tools that can be used for both useful cyber services and bad cyberattacks [72]. Malware bots and internet bots can be programmed or hacked to infiltrate user accounts, systematically search the internet for contact information, send spam, restrict access, or carry out other malicious activities, both locally and globally.…”
Section: Data Software Modelmentioning
confidence: 99%
“…Instead, a plethora of methods have been developed to explain a part or the entirety of the decision-making process. While many of these methods find use in the broader field of cybersecurity ( [2]), the few that have been used to improve ransomware detection focus mainly on the Android operating system and static detection methods ( [2,3]).…”
Section: Related Workmentioning
confidence: 99%
“…The increasing number of ransomware attacks in recent years has led to a corresponding rise in research dedicated to ransomware detection. The methods can be broadly divided into static, which attempt to recognize ransomware without letting it execute, and dynamic, which focus on monitoring the consequences of executing ransomware [2][3][4]. Both approaches increasingly rely on machine learning, and both work well as complementary methods [6].…”
Section: Introductionmentioning
confidence: 99%
“…The academic and professional cybersecurity communities have conducted extensive research on ransomware, developing a deep understanding of its mechanisms, impacts, and countermeasures. Studies have predominantly focused on cryptoransomware, exploring its encryption methods, propagation techniques, and the economic models behind ransom demands [1], [3], [8]- [11]. Despite these efforts, there is a notable lack of focused research on the dynamic behaviors of ransomware that breaches privacy by stealing data.…”
Section: Introductionmentioning
confidence: 99%