Affiliation:
1. Department of Electrical Engineering and Information Systems, University of Pannonia, Egyetem u. 10, 8200 Veszprém, Hungary
2. Department of Computer Science and Systems Technology, University of Pannonia, Egyetem u. 10, 8200 Veszprém, Hungary
Abstract
Ransomware attacks are becoming increasingly sophisticated, and defensive solutions must necessarily evolve. Unfortunately, automated backup management through validation—critical for data recovery after an attack—and strengthening file server protection are not sufficiently addressed in current protection strategies. To focus on this area, an architectural model has been developed that complements traditional central data storage with an additional high-level file server protection solution. However, in addition to the functional adequacy of file server protection solutions, the measurability of operational performance is also important. In order to validate and evaluate the developed ransomware-proof file server protection, a dynamic performance metric is introduced for comparability, by which the performance results measured on the tested client–server architectures are presented, together with the methodology and results of the measurements. Our results show that the investigated model does not cause any performance degradation when moving sensitive data files and their backups during operation and even shows performance improvements in some frequently used configurations. The result proves that the developed real-time approach provides a solution to this critical problem in terms of the time required to restore key data from backups and to ensure file availability and continuity of accessibility. Based on a review of the literature and available solutions, it is concluded that there is no integrated solution for implementing a similar concept in practice, and therefore, the developed model is a gap-filling in this priority area.
Reference25 articles.
1. A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms;Ferdous;IEEE Access,2023
2. Holt, T.J., and Bossler, A.M. (2020). Malicious Software Threats. The Palgrave Handbook of International Cybercrime and Cyberdeviance, Springer International Publishing.
3. Vanness, R., Chowdhury, M.M., and Rifat, N. (2022, January 19–21). Malware: A Software for Cybercrime. Proceedings of the 2022 IEEE International Conference on Electro Information Technology (eIT), Mankato, MN, USA.
4. Microsoft (2023, February 28). Troubleshooting Slow File Copying in Windows. Available online: https://learn.microsoft.com/en-us/troubleshoot/windows-client/performance/troubleshooting-slow-file-copying-in-windows.
5. FBI (2023, February 28). Ransomware, Available online: https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/ransomware.