Detection and Prevention of Crypto-Ransomware
Title | Detection and Prevention of Crypto-Ransomware |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Gonzalez, D., Hayajneh, T. |
Conference Name | 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) |
ISBN Number | 978-1-5386-1104-3 |
Keywords | bitcoin, composability, Computer crime, computer viruses, Crypto-Ransomware, crypto-ransomware detection, crypto-ransomware prevention, Cryptographic Ransomware (CGR), cryptography, cybercriminals, Domain Generated Algorithm (DGA), Electronic mail, Elliptic curve cryptography, Encryption, file types, Malware, Metrics, Payloads, Private-key cryptosystem ransomware, pubcrawl, ransomware, resilience, Resiliency, Servers |
Abstract | Crypto-ransomware is a challenging threat that ciphers a user's files while hiding the decryption key until a ransom is paid by the victim. This type of malware is a lucrative business for cybercriminals, generating millions of dollars annually. The spread of ransomware is increasing as traditional detection-based protection, such as antivirus and anti-malware, has proven ineffective at preventing attacks. Additionally, this form of malware is incorporating advanced encryption algorithms and expanding the number of file types it targets. Cybercriminals have found a lucrative market and no one is safe from being the next victim. Encrypting ransomware targets business small and large as well as the regular home user. This paper discusses ransomware methods of infection, technology behind it and what can be done to help prevent becoming the next victim. The paper investigates the most common types of crypto-ransomware, various payload methods of infection, typical behavior of crypto ransomware, its tactics, how an attack is ordinarily carried out, what files are most commonly targeted on a victim's computer, and recommendations for prevention and safeguards are listed as well. |
URL | http://ieeexplore.ieee.org/document/8249052/ |
DOI | 10.1109/UEMCON.2017.8249052 |
Citation Key | gonzalez_detection_2017 |
- Elliptic curve cryptography
- Servers
- Resiliency
- resilience
- Ransomware
- pubcrawl
- Private-key cryptosystem ransomware
- Payloads
- Metrics
- malware
- file types
- encryption
- bitcoin
- Electronic mail
- Domain Generated Algorithm (DGA)
- cybercriminals
- Cryptography
- Cryptographic Ransomware (CGR)
- crypto-ransomware prevention
- crypto-ransomware detection
- Crypto-Ransomware
- computer viruses
- Computer crime
- composability