A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions.

作者: A. Selcuk Uluagac , Albert Levi , Ahmet Aris , Harun Oz

DOI:

关键词:

摘要: In recent years, ransomware has been one of the most notorious malware targeting end-users, governments, and business organizations. It has become a very profitable business for cybercriminals with revenues of millions of dollars, and a very serious threat to organizations with financial losses of billions of dollars. Numerous studies were proposed to address the ransomware threat, including surveys that cover certain aspects of ransomware research. However, no study exists in the literature that gives the complete picture on …

参考文章(90)
David Emm, Cracking the code: The history of Gpcode Computer Fraud & Security. ,vol. 2008, pp. 15- 17 ,(2008) , 10.1016/S1361-3723(08)70139-8
Moti Yung, Adam Young, Cryptovirology: extortion-based security threats and countermeasures ieee symposium on security and privacy. pp. 129- 140 ,(1996) , 10.5555/525080.884259
Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks Detection of Intrusions and Malware, and Vulnerability Assessment. pp. 3- 24 ,(2015) , 10.1007/978-3-319-20550-2_1
Engin Kirda, Sajjad Arshad, Amin Kharraz, Collin Mulliner, William Robertson, UNVEIL: a large-scale, automated approach to detecting ransomware usenix security symposium. pp. 757- 772 ,(2016)
Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler, CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). pp. 303- 312 ,(2016) , 10.1109/ICDCS.2016.46
Bruce Schneier, Stop Trying to Fix the User ieee symposium on security and privacy. ,vol. 14, pp. 96- 96 ,(2016) , 10.1109/MSP.2016.101
Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics Computers & Electrical Engineering. ,vol. 66, pp. 353- 368 ,(2017) , 10.1016/J.COMPELECENG.2017.10.012
Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi, ShieldFS: a self-healing, ransomware-aware filesystem annual computer security applications conference. pp. 336- 347 ,(2016) , 10.1145/2991079.2991110
Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele, PayBreak: Defense Against Cryptographic Ransomware computer and communications security. pp. 599- 611 ,(2017) , 10.1145/3052973.3053035
Rhythima Shinde, Pieter Van der Veeken, Stijn Van Schooten, Jan van den Berg, Ransomware: Studying transfer and mitigation international conference on computing analytics and security trends. pp. 90- 95 ,(2016) , 10.1109/CAST.2016.7914946