Advanced Petya Ransomware and Mitigation Strategies
Title | Advanced Petya Ransomware and Mitigation Strategies |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Aidan, J. S., Zeenia, Garg, U. |
Conference Name | 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC) |
Date Published | dec |
ISBN Number | 978-1-5386-6373-8 |
Keywords | Advance Petya ransomware, anti-virus detection, composability, Computer crime, cryptography, cyber era, cyber threats, cyber world, cyber-attack, cyber-security, Electronic mail, Encryption, encryption codes, heavy ransom, invasive software, Metrics, mitigations, Organizations, Petya ransomware, pubcrawl, ransomware, ransomware attack, Resiliency |
Abstract | In this cyber era, the cyber threats have reached a new level of menace and maturity. One of the major threat in this cyber world nowadays is ransomware attack which had affected millions of computers. Ransomware locks the valuable data with often unbreakable encryption codes making it inaccessible for both organization and consumers, thus demanding heavy ransom to decrypt the data. In this paper, advanced and improved version of the Petya ransomware has been introduced which has a reduced anti-virus detection of 33% which actually was 71% with the original version. System behavior is also monitored during the attack and analysis of this behavior is performed and described. Along with the behavioral analysis two mitigation strategies have also been proposed to defend the systems from the ransomware attack. This multi-layered approach for the security of the system will minimize the rate of infection as cybercriminals continue to refine their tactics, making it difficult for the organization's complacent development. |
URL | https://ieeexplore.ieee.org/document/8703323 |
DOI | 10.1109/ICSCCC.2018.8703323 |
Citation Key | aidan_advanced_2018 |
- encryption
- Resiliency
- ransomware attack
- Ransomware
- pubcrawl
- Petya ransomware
- Organizations
- Mitigations
- Metrics
- invasive software
- heavy ransom
- encryption codes
- Advance Petya ransomware
- Electronic mail
- Cyber-security
- cyber-attack
- cyber world
- cyber threats
- cyber era
- Cryptography
- Computer crime
- composability
- anti-virus detection