A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

被引:40
|
作者
Alqahtani, Abdullah [1 ,2 ]
Sheldon, Frederick T. [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
[2] Najran Univ, Dept Comp Sci, Najran 61441, Saudi Arabia
关键词
crypto ransomware; data centric; process centric; event-based detection; early detection; deep learning; malware; machine learning-based detection; FEATURE-SELECTION; MUTUAL INFORMATION; INTRUSION DETECTION; N-GRAM; MALWARE; ENSEMBLE; SYSTEM; CLASSIFICATION; RELEVANCE; FEATURES;
D O I
10.3390/s22051837
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems. Due to its unique characteristics, ransomware has attracted the attention of security professionals and researchers toward achieving safer and higher assurance systems that can effectively detect and prevent such attacks. The state-of-the-art crypto ransomware early detection models rely on specific data acquired during the runtime of an attack's lifecycle. However, the evasive mechanisms that these attacks employ to avoid detection often nullify the solutions that are currently in place. More effort is needed to keep up with an attacks' momentum to take the current security defenses to the next level. This survey is devoted to exploring and analyzing the state-of-the-art in ransomware attack detection toward facilitating the research community that endeavors to disrupt this very critical and escalating ransomware problem. The focus is on crypto ransomware as the most prevalent, destructive, and challenging variation. The approaches and open issues pertaining to ransomware detection modeling are reviewed to establish recommendations for future research directions and scope.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Detection and Prevention of Crypto-Ransomware
    Gonzalez, Daniel
    Hayajneh, Thaier
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 472 - +
  • [2] The aftermath of a crypto-ransomware attack at a large academic institution
    Zhang-Kennedy, Leah
    Assal, Hala
    Rocheleau, Jessica
    Mohamed, Reham
    Baig, Khadija
    Chiasson, Sonia
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1061 - 1078
  • [3] Comprehensive Survey on Petya Ransomware Attack
    Aidan, Jagmeet Singh
    Verma, Harsh Kumar
    Awasthi, Lalit Kumar
    2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 122 - 125
  • [4] Crypto-Ransomware Detection Using Behavioural Analysis
    Goyal, Parth S.
    Kakkar, Akshat
    Vinod, Gopika
    Joseph, Gigi
    RELIABILITY, SAFETY AND HAZARD ASSESSMENT FOR RISK-BASED TECHNOLOGIES, 2020, : 239 - 251
  • [5] Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
    Kara, Ilker
    Aydos, Murat
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 764 - 769
  • [6] Buffer Management for Identifying Crypto-ransomware Attack in Environment with no Semantic Information
    Paik, Joon-Young
    Choi, Joong-Hyun
    Jin, Rize
    Wang, Jianming
    Cho, Eun-Sun
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 443 - 450
  • [7] Automatic detection of Android crypto ransomware using supervisor reduction
    Chew, Christopher Jun Wen
    Malik, Robi
    Kumar, Vimal
    Patros, Panos
    DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2024, 34 (04): : 539 - 571
  • [8] Ransomware early detection: A survey
    Cen, Mingcan
    Jiang, Frank
    Qin, Xingsheng
    Jiang, Qinghong
    Doss, Robin
    COMPUTER NETWORKS, 2024, 239
  • [9] A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat
    Tandon, Aditya
    Nayyar, Anand
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2018, VOL 2, 2019, 839 : 403 - 420
  • [10] MIRAD: A Method for Interpretable Ransomware Attack Detection
    Marcinkowski, Bartosz
    Goschorska, Maja
    Wilenska, Natalia
    Siuta, Jakub
    Kajdanowicz, Tomasz
    IEEE ACCESS, 2024, 12 : 133810 - 133820