4.7 Article

A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective

Luis Puche Rondon et al.

Summary: As technology becomes more widely available, the demand for smart devices in homes and workplaces has increased, with a focus on Enterprise Internet-of-Things (E-IoT) systems for more sophisticated applications. However, there is a lack of comprehensive research on E-IoT systems and their vulnerabilities, leading to assumptions about their security. This work aims to address this research gap by emphasizing the components, vulnerabilities, solutions, and security implications of E-IoT systems, providing a systematic analysis and highlighting areas for further research.

AD HOC NETWORKS (2022)

Proceedings Paper Computer Science, Information Systems

SoK: Cryptojacking Malware

Ege Tekiner et al.

Summary: Emerging blockchain and cryptocurrency technologies are reshaping the way businesses operate in cyberspace, leading to the rise of cryptojacking malware. Existing detection methods have limitations in mitigating this threat, highlighting the need for comprehensive research and solutions to address this issue.

2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021) (2021)

Article Computer Science, Information Systems

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems

Javier Franco et al.

Summary: The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential components in daily life, but are also vulnerable to attacks. Honeypots and honeynets can be effective in understanding and defending against attacks, providing strong support for security solutions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence

Sajad Homayoun et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)

Article Computer Science, Software Engineering

Ransomware detection using machine learning algorithms

Seong Il Bae et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Theory & Methods

Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes

Bin Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Telecommunications

Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques

Jinsoo Hwang et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Chemistry, Multidisciplinary

A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning

Hiba Zuhair et al.

APPLIED SCIENCES-BASEL (2020)

Article Chemistry, Multidisciplinary

Optimizing Extreme Learning Machines Using Chains of Salps for Efficient Android Ransomware Detection

Hossam Faris et al.

APPLIED SCIENCES-BASEL (2020)

Article Computer Science, Information Systems

RansomSpector: An introspection-based approach to detect crypto ransomware

Fei Tang et al.

COMPUTERS & SECURITY (2020)

Review Computer Science, Information Systems

I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion

Masoudeh Keshavarzi et al.

COMPUTER SCIENCE REVIEW (2020)

Article Computer Science, Hardware & Architecture

A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection

Yahye Abukar Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

An emerging threat Fileless malware: a survey and research challenges

Sudhakar et al.

CYBERSECURITY (2020)

Article Computer Science, Hardware & Architecture

Ransomware detection and mitigation using software-defined networking: The case of WannaCry

Maxat Akbanov et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Hardware & Architecture

Ransomware protection using the moving target defense perspective

Suhyeon Lee et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Information Systems

On the effectiveness of system API-related information for Android ransomware detection

Michele Scalas et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Ransomware Detection System for Android Applications

Samah Alsoghyer et al.

ELECTRONICS (2019)

Article Computer Science, Theory & Methods

Classification of ransomware families with machine learning based on N-gram of opcodes

Hanqi Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection

Bander Ali Saleh Al-rimy et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure

Jaime Ibarra et al.

PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019) (2019)

Article Computer Science, Information Systems

A Survey on Detection Techniques for Cryptographic Ransomware

Eduardo Berrueta et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer

Peiying Wang et al.

PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19) (2019)

Proceedings Paper Telecommunications

Analyzing WannaCry Ransomware Considering the Weapons and Exploits

Da-Yu Kao et al.

2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION (2019)

Proceedings Paper Engineering, Electrical & Electronic

Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment

Muna Al-Hawawreh et al.

2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS) (2019)

Proceedings Paper Computer Science, Software Engineering

RansomBlocker: a Low-Overhead Ransomware-Proof SSD

Jisung Park et al.

PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Security Assurance Against Cybercrime Ransomware

Habib Ur Rehman et al.

INTELLIGENT COMPUTING & OPTIMIZATION (2019)

Article Computer Science, Information Systems

A Cyber-Kill-Chain based taxonomy of crypto-ransomware features

Tooska Dargahi et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2019)

Article Computer Science, Information Systems

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

Bander Ali Saleh Al-rimy et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Artificial Intelligence

Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory

Aviad Cohen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection

Jing Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

Ransomware early detection by the analysis of file sharing traffic

Daniel Morato et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Proceedings Paper Computer Science, Software Engineering

Machine Learning-Based Detection of Ransomware Using SDN

Greg Cusack et al.

PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection

Alberto Ferrante et al.

FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017) (2018)

Article Engineering, Multidisciplinary

Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection

Bander Ali Saleh Al-rimy et al.

INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING (2018)

Article Computer Science, Hardware & Architecture

Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense

Donghyun Min et al.

IEEE COMPUTER ARCHITECTURE LETTERS (2018)

Article Computer Science, Information Systems

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware

Joobeom Yun et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Article Computer Science, Information Systems

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware

Joobeom Yun et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Proceedings Paper Computer Science, Information Systems

DNA-Droid: A Real-Time Android Ransomware Detection Framework

Amirhossein Gharib et al.

NETWORK AND SYSTEM SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware

Jian Huang et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Software Engineering

Redemption: Real-Time Protection Against Ransomware at End-Hosts

Amin Kharraz et al.

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017) (2017)

Proceedings Paper Computer Science, Information Systems

PAYBREAK : Defense Against Cryptographic Ransomware

Eugene Kolodenker et al.

PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

An Overview of Ransomware in The Windows Platform

Abdulrahman Alzahrani et al.

PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI) (2017)

Editorial Material Computer Science, Information Systems

Stop Trying to Fix the User

Bruce Schneier

IEEE SECURITY & PRIVACY (2016)

Article Computer Science, Information Systems

The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform

Sanggeun Song et al.

MOBILE INFORMATION SYSTEMS (2016)