Revolutionizing Education with AI: Recent Developments and Future Directions



EOI: 10.11242/viva-tech.01.05.001

Download Full Text here



Citation

Chandani Patel,Akhil Pillai,"Ransomware", VIVA-IJRI Volume 1, Issue 7, Article 1, pp. 1-7, 2024. Published by Master of Computer Application Department, VIVA Institute of Technology, Virar, India.

Abstract

Doxware,Extortionware,Infection,Teslacrypt,WannaCry

References

  1. Askarifar, S., Rahman, N. A. A., & Osman, H. (2018). A review of latest wannacry ransomware: Actions and preventions. J. Eng. Sci. Technol, 13, 24-33.
  2. Fernando, D. W., Komninos, N., & Chen, T. (2020). A study on the evolution of ransomware detection using machine learning and deep learning techniques. IoT, 1(2), 551-604.
  3. Kapoor, A., Gupta, A., Gupta, R., Tanwar, S., Sharma, G., & Davidson, I. E. (2021). Ransomware detection, avoidance,and mitigation scheme: a review and future directions. Sustainability, 14(1), 8.
  4. Maurya A.K, Kumar N., Agrawal A., Khan R.A(2017). Ransomware: Evolution, Target and Safety Measures.International Journal of Computer Sciences and Engineering, Volume-6,Issue-1.
  5. J. A. Sherer, “Ransomware -practical and legal considerations for confronting the new economic engine of the dark web,” Richmond Journal of Law and Technology, vol. XXIII, pp. 1–49, 2017.
  6. CyberEdge, “Cyberthreat Defense Report,” 2021, https://cyber-edge.com/cdr/.
  7. A. S. A. Bander, B. A. S. Al-rimy, M. A. Maarof, and S. Z. M. Shaid, “Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions,” Computers & Security, vol. 74, pp. 144–166, 2018.
  8. DigitalGuardian, “A History of Ransomware Attacks,” The Biggest and Worst Ransomware Attacks of All Time, vol. 12, 2019.
  9. J. DeCapua and S. Francisco, “Feds fighting ransomware: how the FBI investigates and how you can help,” Seminar “Emerging Threats” at RSA Conference, vol. 1, 2020.
  10. RansomwareTaskForce, “Combatting Ransomware. A comprehensive framework for action: key recommendations from the Ransomware Task Force,” 2021, https://securityandtechnology.org/ransomwaretaskforce/report/.
  11. Enterprise Survival Guide for Ransomware Attacks https://www.sans.org/reading-room/whitepapers/incident/enterprise-survival-guide-ransomware-attacks-36962
  12. Steps to Take on Ransomware http://www.govtech.com/security/5-Steps-Ransomware-Defense-in-Layers-Approach.html
  13. FBI says crypto ransomware has raked in >$18 million for cybercriminals https://arstechnica.com/security/2015/06/fbi-says-crypto-ransomware-has-raked-in-18-million-for-cybercriminals/
  14. Ransomware https://en.wikipedia.org/wiki/Ransomware#cite_note-ars-fbicryptowall-11
  15. Reasons Why You Should Take Ransomware Seriously http://www.darkreading.com/endpoint/4-reasons-why-you-should-take-ransomware-seriously/a/d-id/1327933
  16. Ransomware attacks against businesses increased threefold in 2016 https://www.pcworld.idg.com.au/article/611399/ransomware-attacks-against-businesses-increased-threefold-2016/
  17. Things you can do to protect against Ransomware https://www.welivesecurity.com/2013/12/12/11-things-you-can-do-to-protect-against-ransomware-including-cryptolocker/
  18. H. Oz, A. Aris, A. Levi, and A. S. UluagacUluagac, “A survey on ransomware: evolution, taxonomy, and defense solutions,” ACM Computing Surveys, vol. 1–39, 2022.
  19. H. AlshaikhAlshaikh, N. Ramadan, and H. AhmedAhmed, “Ransomware prevention and mitigation techniques,” International Journal of Computer Application, vol. 177, no. 40, pp. 31–39, 2020.
  20. Cybereason, “Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert,” 2020, https://www.cybereason.com/blog/cybereason-honeypot-multistage-ransomware.
  21. Types of ransomware : https://www.crowdstrike.com/cybersecurity-101/ransomware/types-of-ransomware/