Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

Survey on Ransomware: A New Era of Cyber Attack

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Gandhi Krunal A., Patel Viral Kumar D.
10.5120/ijca2017914446

Gandhi Krunal A. and Patel Viral Kumar D.. Survey on Ransomware: A New Era of Cyber Attack. International Journal of Computer Applications 168(3):38-41, June 2017. BibTeX

@article{10.5120/ijca2017914446,
	author = {Gandhi Krunal A. and Patel Viral Kumar D.},
	title = {Survey on Ransomware: A New Era of Cyber Attack},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {3},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {38-41},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume168/number3/27859-2017914446},
	doi = {10.5120/ijca2017914446},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In today’s world, a most popular crime is Cybercrime. In this paper through a literature study, effect of ransomware is discussed. In this needy internet world, how crucial is to use a non-secure connection and how it will track a normal user or unaware user into the trap of hacker and after that losing money in terms of bit-coins. At last, with the damage cause by the latest attack of ransomware around the world is proved that there is lacks of awareness among the company professionals is confirmed and pay a high amount of money in bit-coins.

References

  1. Chris Moore, "Detecting Ransomware with Honeypot techniques,” 2016 Cybersecurity and Cyberforensics Conference
  2. Rhythima Shinde, Pieter Van der Veeken, Stijn Van Schooten, Jan van den Berg. "Ransomware: Studying Transfer and Mitigation,” 2016 International Conference on Computing, Analytics and Security Trends (CAST)
  3. L. Kelion, "Cryptolocker ransomware has 'infected about 250,000 PCs'," BBC News techology, 2013. [Online]. Available: http://www.bbc.com/news/technology-25506020. [Accessed 2016].
  4. G. O’Gorman and G. McDonald, "Ransomware: a growing menace," Symantec Corporation, 2012.
  5. B. N. Giri, N. Jyoti and M. AVERT, "The Emergence of Ransomware," AVAR, Auckland, 2006.
  6. J.-L. Richet, "Extortion on the internet: the rise of crypto-ransomware.," Harvard , 2016.
  7. A. Bhardwaj, G. Subrahmanyam, V. Avasthi and H. Sastry, "Ransomware: A rising threat of new age digital extortion.," in arXiv preprint arXiv:1512.01980, 2015.
  8. X. Luo and Q. Liao, "Awareness education as the key to ransomware prevention.," Information Systems Security, vol. 16, no. 4, pp. 195-202, 2007.
  9. A. Gazet, "Comparative analysis of various ransomware virii," Journalin computer virology, vol. 6, no. 1, pp. 77-90, 2010.
  10. M. Fossi, G. Egan, K. Haley, E. Johnson, T. Mack, T. Adams, J.Blackbird, M. Low, D. Mazurek, D. McKinney and P. Wood, "Symantec internet security threat report trends for 2010," Symantec, 2011.
  11. B. Foster and Y. Lejins, "Ehealth security Australia: The solution lies with frameworks and standards.," 2013.
  12. J. C. a. E. A. B. Hernandez-Castro, "UK has little to be proud of assurvey reveals sorry state of European cybersecurity," University of Kent, 2015. [Online]. Available: https://kar.kent.ac.uk/51071/1/uk-haslittle- to-be-proud-of-as-survey-reveals-sorry-state-of european cyber security-37505. [Accessed 2016].
  13. K.-K. R. Choo and R. G. Smith, "Criminal exploitation of online systems by organised crime groups," Asian journal of criminology, vol. 3, no. 1, pp. 37-59, 2008.
  14. K. Gradon, "Crime science and the internet battlefield: Securing the analog world from digital crime.," Security & Privacy, IEEE, vol. 11, no. 5, pp. 93-95, 2013.
  15. T. Zhang, H. Antunes and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework.," Internet of Things Journal, IEEE, vol. 1, no. 10, pp. 10-21, 2014.
  16. https://www.wired.com/.../wannacry-ransomware-hackers-made-real-amateur-mistake...

Keywords

Ransomware, bitcoins, TOR, wannacry 2.0, payment, education.