Aurangzeb, S., Aleem, M., Iqbal, M. A., & Islam, M. A. (2017). Ransomware: a survey and trends. Journal of Information Assurance & Security, 6(2), 48-58.
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), 5-9.
Gonzalez, D., & Hayajneh, T. (2017, October). Detection and prevention of crypto-ransomware. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 472-478). IEEE.
Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. N. (2017, December). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (pp. 222-226).
Herrera Silva, J. A., Barona López, L. I., Valdivieso Caraguay, Á. L., & Hernández-Álvarez, M. (2019). Remote Sensing, 11(10), 1168.
Humayun, M., Jhanjhi, N. Z., Alsayat, A., & Ponnusamy, V. (2020. Egyptian Informatics Journal.
Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10.
Lee, J. K., Moon, S. Y., & Park, J. H. (2017). CloudRPS: a cloud analysis based enhanced ransomware prevention system. The Journal of Supercomputing, 73(7), 3065-3084.
Lawrence, A. (202). Intel’s Habana Labs hacked by Pay2Key ransomware, data stolen. Retrieved on May, 3, 2021. https://www.bleepingcomputer.com/news/security/intels-habana-labs-hacked-by-pay2key-ransomware-data-stolen/
Malecki, F. (2019). Best practices for preventing and recovering from a ransomware attack. Computer Fraud & Security, 2019(3), 8-10.
Mishra, R. Strategies: To Defeat Ransomware Attacks.
Pazik, E. (2017). Ransomware: Attack Vectors, Mitigation and Recovery (Doctoral dissertation, Utica College).
PurpleSec (2020). The Growing Threat Of Ransomware. Retrieved on April, 22, 2021. https://purplesec.us/resources/cyber-security-statistics/ransomware/#:~:text=81%25%20of%20cyber%20security%20experts,social%20actions%2C%20such%20as%20phishing.&text=Ransomware%20attacks%20increased%2041%25%20in,lost%20access%20to%20their%20files.
Sajjan, R. S., & Ghorpade, V. R. (2017, March). Ransomware attacks: Radical menace for cloud computing. In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 1640-1646). IEEE
Sen, S.K, Chourey. N. A Study of Ransomware Detection and Prevention at Organizations. International Research Journal of Engineering and Technology (IRJET) 2001-2008
Surati, S. B., & Prajapati, G. I. (2017). A Review on Ransomware Detection & Prevention. International Journal of Research and Scientific Innovation, 4(9), 2321-2705.
Statista (2020) Annual number of ransomware attacks worldwide from 2014 to 2020. Retrieved on April, 22, 2021. https://www.statista.com/statistics/494947/ransomware-attacks-per-year-worldwide/
Vinayakumar, R., Soman, K. P., Velan, K. S., & Ganorkar, S. (2017, September). Evaluating shallow and deep networks for ransomware detection and classification. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 259-265). IEEE.
Zakaria, W. Z. A., Abdollah, M. F., Mohd, O., & Ariffin, A. F. M. (2017, December). The rise of ransomware. In Proceedings of the 2017 International Conference on Software and e-Business (pp. 66-70).
Zakaria, W. Z., Abdollah, M. F., & Ariffin, A. M. On Ransomware Detection. In Proceedings of the Seventh International Conference on Informatics and Applications (ICIA2018) (pp. 12-17).
- Abstract viewed - 1437 times
- Pdf downloaded - 1035 times
Affiliations
Ku Amiriyah Ku Othman
School of computing, Universiti Utara Malaysia (UUM), Malaysia
Mohamad Fadli Zolkipli
School of computing, Universiti Utara Malaysia (UUM), Malaysia
How to Cite
Survey on Technique to Prevent Ransomware Attack
Vol 4 No 1 (2021): March
Submitted: May 4, 2021
Published: May 11, 2021
Abstract
As the number usage of technology has increased these days. The number of ransomware attacks have also significantly increased throughout the years. Ransomware is an attack made on the device and the victim data or file. It will lock until the victim pays for it. This article is constructed to survey on the technique to prevent the ransomware attack. This article also covers the history and type of ransomware attack. This research is done by reviewing the related articles and categorizing them in a table.