A Study on- Identifying and Evading Ransomware (Ransomware)

International Journal of Computer Science and Engineering
© 2018 by SSRG - IJCSE Journal
Volume 5 Issue 2
Year of Publication : 2018
Authors : Mrs.V. Usha Bala, Dr.B.D.C.N.Prasad

pdf
Citation:
MLA Style:

Mrs.V. Usha Bala, Dr.B.D.C.N.Prasad, "A Study on- Identifying and Evading Ransomware (Ransomware)" SSRG International Journal of Computer Science and Engineering 5.2 (2018): 9-13.

APA Style:

Mrs.V. Usha Bala, Dr.B.D.C.N.Prasad,(2018). A Study on- Identifying and Evading Ransomware (Ransomware). SSRG International Journal of Computer Science and Engineering 5(2), 9-13.

Abstract:

Ransomware has become widely threatening the user of the internet. It is a malware that damages the victim‟s system and makes it useless and then demands the user for a ransom which can also be called as crypto currency to revert the system‟s usage. In this paper we propose analysis and detection of ransomware by which the features of ransomware can be identified and perform operations to protect the user‟s system. We also propose the methods of protecting the user‟s system before it‟s attacked. This increases the business continuity of the organizations thereby increasing the organization‟s performance.

References:

[1] Kim Boatman, “Beware the Rise of Ransomware”,http://in.norton.com/yoursecurityresource/detail.jsp?aid=rise_in_ransomware 
[2] Carrier, B. “File System Forensic Analysis”, Addison-Wesley Professional, (2005). 
[3] CISCO, Inc. Ransomware on Steroids: Cryptowall2.0.http://blogs.cisco.com/security/talos/cryptowall-2. 
[4] Krebs on Security, “Inside a Reveton RansomwareOperation”http://krebsonsecurity.com/2012/08/inside-a-reveton-ransomware-operation/ 
[5] Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, “Cutting the gordian knot: A look under the hood of ransomware attacks”,12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015), July 9-10, 2015, Milan, Italy. 
[6] Zeng, Kazemian, Varghese,and Nick “Automatic Test Packet Generation”,VOL. 22, NO. 2, APRIL, 2014. 
[6] Bowen, B. M., Hershkop, S., Keromytis, A. D., Stolfo, S. J. “Baiting inside attackers using decoy documents”, Springer, (2009). 
[7] K.Cabaj, P.Gawkowski, K.Grochowski, D. Osojca, “Network activity analysis of CryptoWall ransomware”, Przeglad Elektrotechniczny, vol. 91, nr11,2015,ss.201- 204,URL:http://pe.org.pl/articles/2015/11/48.pdf. 
[8] Dewan P, Kashyap A, Kumaraguru P. Analyzing social and stylometric features to identify spear phishing emails. In: APWG Symposium on Electronic Crime Research (eCrime), Institute of Electrical and Electronics Engineers. 2014. p.1–13. doi:10.1109/ecrime.2014.6963160. 
[9] Green B, Prince D, Busby J, Hutchison D. The impact of social engineering on industrial control system security, in: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, ACM, 2015, pp. 23–9. Huber M, Kowalski S, Nohlberg M, Tjoa S. Towards automating social engineering using social networking sites, in: International Conference on Computational Science and Engineering, 2009 (CSE„09), Vol. 3, IEEE, 2009, pp. 117–24. 
[10] Knowles W, Baron A, McGarr T. The simulated security assessment ecosystem: does penetration testing need standardisation? Comp Sec 2016;62:296–316. Kontaxis G, Polakis I, Ioannidis S, Markatos EP. Detecting social network profile cloning, in: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, IEEE, 2011, pp. 295–300. 
[11] Zhang H, Yao DD, Ramakrishnan N, Zhang Z. Causality reasoning about network events for detecting stealthy malware activities. Comp Sec 2016;58:180–98 
[12] Narayanan A, Shmatikov V. De-anonymizing social networks, in: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), IEEE Computer Society, 2009, pp. 173–87. Perito D, Castelluccia C, Kaafar MA, Manils P. How unique and traceable are usernames? In: Privacy Enhancing Technologies. Springer; 2011. p. 1–17. 
[13] Azad Ali, Ransomware: A research and a personal case of Dealing with this nasty malware (IISIT.org), Volume 14, 2017. 
[14] Ali, Murthy, R., & Kohun, F.(2016). Recovering from the nightmare ransomware-How savvy users get hit with viruses and malware: A personal case study: Issues in Information Systems, 17(4),58-69.
[15] Bharadwaj, A.,Avasthi, V.,Sastry, H.,& subrahmanyam, G.V.B.(2016). Ransomware digital extortion: A rising new age threat. Indian Journal of Science and Technology, 9,14.

Key Words:

Ransomware, Unauthorized access, crypto currency, business continuity, malware, ransom, false positives.