CFP last date
20 May 2024
Reseach Article

Survey on Ransomware: A New Era of Cyber Attack

by Gandhi Krunal A., Patel Viral Kumar D.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 3
Year of Publication: 2017
Authors: Gandhi Krunal A., Patel Viral Kumar D.
10.5120/ijca2017914446

Gandhi Krunal A., Patel Viral Kumar D. . Survey on Ransomware: A New Era of Cyber Attack. International Journal of Computer Applications. 168, 3 ( Jun 2017), 38-41. DOI=10.5120/ijca2017914446

@article{ 10.5120/ijca2017914446,
author = { Gandhi Krunal A., Patel Viral Kumar D. },
title = { Survey on Ransomware: A New Era of Cyber Attack },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 3 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number3/27859-2017914446/ },
doi = { 10.5120/ijca2017914446 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:11.684464+05:30
%A Gandhi Krunal A.
%A Patel Viral Kumar D.
%T Survey on Ransomware: A New Era of Cyber Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 3
%P 38-41
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world, a most popular crime is Cybercrime. In this paper through a literature study, effect of ransomware is discussed. In this needy internet world, how crucial is to use a non-secure connection and how it will track a normal user or unaware user into the trap of hacker and after that losing money in terms of bit-coins. At last, with the damage cause by the latest attack of ransomware around the world is proved that there is lacks of awareness among the company professionals is confirmed and pay a high amount of money in bit-coins.

References
  1. Chris Moore, "Detecting Ransomware with Honeypot techniques,” 2016 Cybersecurity and Cyberforensics Conference
  2. Rhythima Shinde, Pieter Van der Veeken, Stijn Van Schooten, Jan van den Berg. "Ransomware: Studying Transfer and Mitigation,” 2016 International Conference on Computing, Analytics and Security Trends (CAST)
  3. L. Kelion, "Cryptolocker ransomware has 'infected about 250,000 PCs'," BBC News techology, 2013. [Online]. Available: http://www.bbc.com/news/technology-25506020. [Accessed 2016].
  4. G. O’Gorman and G. McDonald, "Ransomware: a growing menace," Symantec Corporation, 2012.
  5. B. N. Giri, N. Jyoti and M. AVERT, "The Emergence of Ransomware," AVAR, Auckland, 2006.
  6. J.-L. Richet, "Extortion on the internet: the rise of crypto-ransomware.," Harvard , 2016.
  7. A. Bhardwaj, G. Subrahmanyam, V. Avasthi and H. Sastry, "Ransomware: A rising threat of new age digital extortion.," in arXiv preprint arXiv:1512.01980, 2015.
  8. X. Luo and Q. Liao, "Awareness education as the key to ransomware prevention.," Information Systems Security, vol. 16, no. 4, pp. 195-202, 2007.
  9. A. Gazet, "Comparative analysis of various ransomware virii," Journalin computer virology, vol. 6, no. 1, pp. 77-90, 2010.
  10. M. Fossi, G. Egan, K. Haley, E. Johnson, T. Mack, T. Adams, J.Blackbird, M. Low, D. Mazurek, D. McKinney and P. Wood, "Symantec internet security threat report trends for 2010," Symantec, 2011.
  11. B. Foster and Y. Lejins, "Ehealth security Australia: The solution lies with frameworks and standards.," 2013.
  12. J. C. a. E. A. B. Hernandez-Castro, "UK has little to be proud of assurvey reveals sorry state of European cybersecurity," University of Kent, 2015. [Online]. Available: https://kar.kent.ac.uk/51071/1/uk-haslittle- to-be-proud-of-as-survey-reveals-sorry-state-of european cyber security-37505. [Accessed 2016].
  13. K.-K. R. Choo and R. G. Smith, "Criminal exploitation of online systems by organised crime groups," Asian journal of criminology, vol. 3, no. 1, pp. 37-59, 2008.
  14. K. Gradon, "Crime science and the internet battlefield: Securing the analog world from digital crime.," Security & Privacy, IEEE, vol. 11, no. 5, pp. 93-95, 2013.
  15. T. Zhang, H. Antunes and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework.," Internet of Things Journal, IEEE, vol. 1, no. 10, pp. 10-21, 2014.
  16. https://www.wired.com/.../wannacry-ransomware-hackers-made-real-amateur-mistake...
Index Terms

Computer Science
Information Sciences

Keywords

Ransomware bitcoins TOR wannacry 2.0 payment education.