CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey on Ransomware: A New Era of Cyber Attack

by Gandhi Krunal A., Patel Viral Kumar D.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 3
Year of Publication: 2017
Authors: Gandhi Krunal A., Patel Viral Kumar D.
10.5120/ijca2017914446

Gandhi Krunal A., Patel Viral Kumar D. . Survey on Ransomware: A New Era of Cyber Attack. International Journal of Computer Applications. 168, 3 ( Jun 2017), 38-41. DOI=10.5120/ijca2017914446

@article{ 10.5120/ijca2017914446,
author = { Gandhi Krunal A., Patel Viral Kumar D. },
title = { Survey on Ransomware: A New Era of Cyber Attack },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 3 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number3/27859-2017914446/ },
doi = { 10.5120/ijca2017914446 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:11.684464+05:30
%A Gandhi Krunal A.
%A Patel Viral Kumar D.
%T Survey on Ransomware: A New Era of Cyber Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 3
%P 38-41
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world, a most popular crime is Cybercrime. In this paper through a literature study, effect of ransomware is discussed. In this needy internet world, how crucial is to use a non-secure connection and how it will track a normal user or unaware user into the trap of hacker and after that losing money in terms of bit-coins. At last, with the damage cause by the latest attack of ransomware around the world is proved that there is lacks of awareness among the company professionals is confirmed and pay a high amount of money in bit-coins.

References
  1. Chris Moore, "Detecting Ransomware with Honeypot techniques,” 2016 Cybersecurity and Cyberforensics Conference
  2. Rhythima Shinde, Pieter Van der Veeken, Stijn Van Schooten, Jan van den Berg. "Ransomware: Studying Transfer and Mitigation,” 2016 International Conference on Computing, Analytics and Security Trends (CAST)
  3. L. Kelion, "Cryptolocker ransomware has 'infected about 250,000 PCs'," BBC News techology, 2013. [Online]. Available: http://www.bbc.com/news/technology-25506020. [Accessed 2016].
  4. G. O’Gorman and G. McDonald, "Ransomware: a growing menace," Symantec Corporation, 2012.
  5. B. N. Giri, N. Jyoti and M. AVERT, "The Emergence of Ransomware," AVAR, Auckland, 2006.
  6. J.-L. Richet, "Extortion on the internet: the rise of crypto-ransomware.," Harvard , 2016.
  7. A. Bhardwaj, G. Subrahmanyam, V. Avasthi and H. Sastry, "Ransomware: A rising threat of new age digital extortion.," in arXiv preprint arXiv:1512.01980, 2015.
  8. X. Luo and Q. Liao, "Awareness education as the key to ransomware prevention.," Information Systems Security, vol. 16, no. 4, pp. 195-202, 2007.
  9. A. Gazet, "Comparative analysis of various ransomware virii," Journalin computer virology, vol. 6, no. 1, pp. 77-90, 2010.
  10. M. Fossi, G. Egan, K. Haley, E. Johnson, T. Mack, T. Adams, J.Blackbird, M. Low, D. Mazurek, D. McKinney and P. Wood, "Symantec internet security threat report trends for 2010," Symantec, 2011.
  11. B. Foster and Y. Lejins, "Ehealth security Australia: The solution lies with frameworks and standards.," 2013.
  12. J. C. a. E. A. B. Hernandez-Castro, "UK has little to be proud of assurvey reveals sorry state of European cybersecurity," University of Kent, 2015. [Online]. Available: https://kar.kent.ac.uk/51071/1/uk-haslittle- to-be-proud-of-as-survey-reveals-sorry-state-of european cyber security-37505. [Accessed 2016].
  13. K.-K. R. Choo and R. G. Smith, "Criminal exploitation of online systems by organised crime groups," Asian journal of criminology, vol. 3, no. 1, pp. 37-59, 2008.
  14. K. Gradon, "Crime science and the internet battlefield: Securing the analog world from digital crime.," Security & Privacy, IEEE, vol. 11, no. 5, pp. 93-95, 2013.
  15. T. Zhang, H. Antunes and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework.," Internet of Things Journal, IEEE, vol. 1, no. 10, pp. 10-21, 2014.
  16. https://www.wired.com/.../wannacry-ransomware-hackers-made-real-amateur-mistake...
Index Terms

Computer Science
Information Sciences

Keywords

Ransomware bitcoins TOR wannacry 2.0 payment education.