Ransomware, Threat and Detection Techniques: A Review

被引:0
|
作者
Kok, S. H. [1 ]
Abdullah, Azween [1 ]
Jhanjhi, N. Z. [1 ]
Supramaniam, Mahadevan [2 ]
机构
[1] Taylors Univ, Sch Comp & Informat Technol, Subang Jaya, Malaysia
[2] SEGI Univ, Res & Innovat Management Ctr, Petaling Jaya, Malaysia
关键词
Ransomware; Intrusion Detection (ID); Machine Learning (ML); Honeypot; MALWARE; CLASSIFICATION; FAMILIES; SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularity of ransomware has created a unique ecosystem of cybercriminals. Therefore, the objectives of this paper are to provide a thorough understanding of ransomware's threat and discuss recent detection techniques used. Successful ransomware attack has direct financial implication, which is fuelled by several mature enablers, such as encryption technology, cyber currency and accessibility. Encryption is effective and almost unbreakable. Anonymous cyber currency can avoid traceability. Easily obtainable ransomware code enables easy entry. A combination of these provides an attractive avenue for cybercriminals, producing specialist cybercriminals. In terms of detection techniques, it was found that machine learning (ML) via regression algorithms was the most technique adopted by researchers of ransomware. However, none of the researchers have produced any model to protect against ransomware attack. This research highlights the need of a solution using ML algorithm for the detection engine.
引用
收藏
页码:136 / 146
页数:11
相关论文
共 50 条
  • [1] Review of Current Ransomware Detection Techniques
    Davies, Simon R.
    Macfarlane, Richard
    Buchanan, William J.
    [J]. 2021 7TH INTERNATIONAL CONFERENCE ON ENGINEERING AND EMERGING TECHNOLOGIES (ICEET 2021), 2021, : 696 - 701
  • [2] Review on Insider Threat Detection Techniques
    Oladimeji, T. O.
    Ayo, C. K.
    Adewumi, S. E.
    [J]. 3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
  • [3] A Review on Android Ransomware Detection Using Deep Learning Techniques
    Alzahrani, Nisreen
    Alghazzawi, Daniyal
    [J]. 11TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES), 2019, : 330 - 335
  • [4] A Survey on Detection Techniques for Cryptographic Ransomware
    Berrueta, Eduardo
    Morato, Daniel
    Magana, Eduardo
    Izal, Mikel
    [J]. IEEE ACCESS, 2019, 7 : 144925 - 144944
  • [5] Study on Systematic Ransomware Detection Techniques
    Lee, Sun-Jin
    Shim, Hye-Yeon
    Lee, Yu-Rim
    Park, Tae-Rim
    Park, So-Hyun
    Lee, Il-Gu
    [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022,
  • [6] Study on Systematic Ransomware Detection Techniques
    Lee, Sun-Jin
    Shim, Hye-Yeon
    Lee, Yu-Rim
    Park, Tae-Rim
    Park, So-Hyun
    Lee, Il-Gu
    [J]. 2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 297 - 301
  • [7] Explainable Ransomware Detection with Deep Learning Techniques
    Ciaramella, Giovanni
    Iadarola, Giacomo
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (02) : 317 - 330
  • [8] Explainable Ransomware Detection with Deep Learning Techniques
    Giovanni Ciaramella
    Giacomo Iadarola
    Fabio Martinelli
    Francesco Mercaldo
    Antonella Santone
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 317 - 330
  • [9] A Review of Ransomware Families and Detection Methods
    Chittooparambil, Helen Jose
    Shanmugam, Bharanidharan
    Azam, Sami
    Kannoorpatti, Krishnan
    Jonkman, Mirjam
    Samy, Ganthan Narayana
    [J]. RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 588 - 597
  • [10] Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art
    Aldauiji, Fatimah
    Batarfi, Omar
    Bayousef, Manal
    [J]. IEEE ACCESS, 2022, 10 : 61695 - 61706