ARYA’S RANFRAME: A COMPREHENSIVE FRAMEWORK FOR RANSOMWARE DEFENSE
Keywords:
Cyber security, Ransomware, EncryptionAbstract
Ransomware is one of the most popular attacks that threaten victims by encrypting their personal confidential data. This article aims to provide a comprehensive examination of Ransomware attacks and their consequences for individuals, systems, and IT infrastructure. It also investigates the many forms of attack’s that are utilized as a prerequisite for Ransomware attacks. Investigating the processes utilized to prevent ransomware attacks from occurring before they enter the local area network. Discovery of ways for reducing the impact of ransomware attacks at a level of difficulty for the attacker. Based on the findings, a few recommendations and conclusions are given. The study's approach comprises acquiring information through surveys and interviews from various users, victims, and working professionals who are the study's primary stakeholders. It also covers research based on many research papers and articles that conduct ransomware research. The study examines ransomware attacks and their consequences holistically. It also identifies the types of attacks that result in access gaining for ransomware attacks and discusses the most powerful and destructive ransomware attacks in the past, which had a significant impact on victims and various organizations in IT infrastructure. At the end of the investigation and analysis, recommendations and conclusions are provided in order to avoid or minimize and reduce the impact of ransomware assaults, making it impossible for the attacker to execute an attack.
Downloads
Metrics
References or Bibliography
Kelley, K. (2022, December 8). What is Cybersecurity and Why It is Important? Simplilearn. Retrieved January 4, 2023, from https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-cyber-security
Simoiu, C., Bonneau, J., Gates, C., & Goel, S. (2019). " I was told to buy a software or lose my computer. I ignored it": A study of ransomware. In Fifteenth symposium on usable privacy and security (SOUPS 2019) (pp. 155-174).
Tailor, J. P., & Patel, A. D. (2017). A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage Control. International Journal of Research and Scientific Innovation (IJRSI), 4(6), 116-121. https://www.rsisinternational.org/IJRSI/Issue42/116-121.pdf
S. K. Shaukat and V. J. Ribeiro, (2018) "RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning," 2018 10th International Conference on Communication Systems & Networks (COMSNETS), pp. 356-363, doi: 10.1109/COMSNETS.2018.8328219.
Okpongete, F. (2022). Intelligent Endpoint-based Ransomware Detection Framework
Urooj, U., Al-rimy, B. A. S., Zainal, A., Ghaleb, F. A., & Rassam, M. A. (2022). Ransomware detection using the dynamic analysis and machine learning: A survey and research directions. Applied Sciences, 12(1), 172.
Mohammad, A. H. (2020). Ransomware evolution, growth and recommendation for detection. Modern Applied Science, 14(3), 68. https://doi.org/10.5539/mas.v14n3p68.
Simoiu, C., Bonneau, J., Gates, C., & Goel, S. (2019). " I was told to buy a software or lose my computer. I ignored it": A study of ransomware. In Fifteenth symposium on usable privacy and security (SOUPS 2019) (pp. 155-174).
Tailor, J. P., & Patel, A. D. (2017). A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage Control. International Journal of Research and Scientific Innovation (IJRSI), 4(6), 116-121. https://www.rsisinternational.org/IJRSI/Issue42/116-121.pdf
Published
How to Cite
Issue
Section
Copyright (c) 2023 Anjum Zameer Bhat; Arya Virmani
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.