A Survey on Situational Awareness of Ransomware Attacks—Detection and Prevention Parameters

Author:

Herrera Silva Juan A.ORCID,Barona López Lorena IsabelORCID,Valdivieso Caraguay Ángel LeonardoORCID,Hernández-Álvarez MyriamORCID

Abstract

In recent years, cybercrime activities have grown significantly, compromising device security and jeopardizing the normal activities of enterprises. The profits obtained through intimidation and the limitations for tracking down the illegal transactions have created a lucrative business based on the hijacking of users’ files. In this context, ransomware takes advantage of cryptography to compromise the user information or deny access to the operating system. Then, the attacker extorts the victim to pay a ransom in order to regain access, recover the data, or keep the information private. Nowadays, the adoption of Situational Awareness (SA) and cognitive approaches can facilitate the rapid identification of ransomware threats. SA allows knowing what is happening in compromised devices and network communications through monitoring, aggregation, correlation, and analysis tasks. The current literature provides some parameters that are monitored and analyzed in order to prevent these kinds of attacks at an early stage. However, there is no complete list of them. To the best of our knowledge, this paper is the first proposal that summarizes the parameters evaluated in this research field and considers the SA concept. Furthermore, there are several articles that tackle ransomware problems. However, there are few surveys that summarize the current situation in the area, not only regarding its evolution but also its issues and future challenges. This survey also provides a classification of ransomware articles based on detection and prevention approaches.

Publisher

MDPI AG

Subject

General Earth and Planetary Sciences

Reference63 articles.

1. ISTR 2018;Cleary;Internet Secur. Threat Rep.-Symantec,2018

2. Detecting crypto-ransomware in IoT networks based on energy consumption footprint

3. ESET Security 2018;Eset,2018

4. Ransomware 2017, An ISTR Special Report. Symantechttps://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-ransomware-2017-en.pdf

Cited by 39 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Early Ransomware Detection with Deep Learning Models;Future Internet;2024-08-11

2. Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms;Journal of Network and Computer Applications;2024-03

3. Ransomware early detection: A survey;Computer Networks;2024-02

4. Damages Caused by Ransomware and Selected Preventive Countermeasures;Communications in Computer and Information Science;2024

5. Research on Network Security Situation Awareness Technology Based on Neural Network Model;2023 International Conference on Intelligent Sensing and Industrial Automation;2023-12-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3