A SURVEY ON RANSOMEWARE: EVOLUTION, GROWTH, AND IMPACT
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
W. Stallings, “Cryptography and network Security: Principles and Practicesâ€, Prentice Hall, Fifth Edition, 2011.
B. Forouzan, “Cryptography and Network Securityâ€, Tata McGraw Hills, 2007.
B. Schneier, “Applied Cryptography, Second Edition: Proto-cols, Algorithms and Source Code in Câ€, John Wiley and Sons, 1996.
“What is Malware and How Can We Prevent itâ€, Norton Security Center, Online article.
“Understanding Ransomware and Ways to Defeat it, White Paperâ€, McAfee Labs, 2017.
“Ransomware White Paperâ€, SWGfl, October 2016.
“Ransomware White Paperâ€, CERT.be, 26th July, 2016.
“Ransomware Holding Your Data Hostageâ€, White Paper, Deloitte, 12 August 2016.
A. Ivanov, D. Emm, F. Sinitsyn, S. Pontiroli “The Ransomware Revolutionâ€, Kasperksy Security Bulletin, 2016.
“How Ransomware Worksâ€, White paper, LogRythm, May 2016.
J. Wyke, A. Ajjan, “The Current State of Ransomwareâ€, SophosLabs Technical Paper, December 2015.
K. Savage, P. Coogon, H. Lau, “Security Response: The Evolution of Ransomwareâ€, White Paper, Symentac, 6th August 2015.
A special report “Ransomware and Businesses 2016â€, Syman-tec, 2016.
[Online] nakedsecurity.sophos.com, [last accessed 2017/07/15].
K. Richards, “Recent ransomware attacks: Data shows 50% growth in 2016â€, SecuritySearch, 2016.
J. Crowe, “Ransomware Growth by the Numbers: Ransom-ware Statistics 2017â€, Barkley, June, 2017.
J. Crowe, “Ransomware by the Numbers: Must-Know Ransomware Statistics 2016â€, Barkley, August 2016.
“White Paper: Ransomware. The virus plumes new depths.†Ethical IT, 9th August, 2017.
“Understanding the Depth of the Global Ransomware Prob-lemâ€, Osterman Research Survey Report, August 2016.
N. Scaife, H. Carter, P. Traynor, K. Butler, “CryptoLock (and Drop it): Stopping Ransomware Attacks on User Dataâ€, IEEE 36th International Conference on Distributed Computing Sys-tems, 2016.
“Five Things You Need To Know About CryptoLockerâ€, White Paper, Zscaler, 2017.
G. O’ Gorman, G. McDonald, “Ransomware: A Growing Menaceâ€, White Paper, Symantec, 8th November, 2012.
“Ransomware and Businesses 2016â€, White Paper, Symantec, August 2016.
S. Mehmood, “Enterprise Survival Guide for Ransomware At-tacksâ€, White Paper, SANS Institute Reading Room, 30th April 2016.
“Ransomware and Phishing: How to Avoid Falling Victim to These Threatsâ€, White Paper, Barracuda, 19th January, 2017.
R. S. Sajjan, V. R. Ghorpade, “Ransomware attacks: Radical menace for cloud computingâ€, International Conference on Wireless Communications, Signal Processing and Net-working (WiSPNET), 2017.
C. L. Gande, R. G. Gutierrez, “Give us this day our daily ran-somwareâ€, IEEE 37th Central America and Panama Convention (CONCAPAN XXXVll), 2017.
D. Caivano, G. Canfora, A. Cocomazzi, A. Pirozzi, C. A. Vis-aggio, “Ransomware at X-Raysâ€, IEEE International Confer-ence on Internet of Things (iThings) and IEEE Green Compu-ting and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2017.
Q. Chen, R. A. Bridges, “Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomwareâ€, 16th IEEE International Conference on Machine Learning and Ap-plications (ICMLA), 2017.
H. Kim, D. Yoo, J. Kang, Y. Yeom “Dynamic ransomware protection using deterministic random bit generatorâ€, IEEE Conference on Application, Information and Network Security (AINS), 2017.
B. Kenyon, J. McCafferty, “Ransomware Recoveryâ€, ITNOW, Vol.: 58, Issue: 4, Dec. 2016.
D. Gonzalez, T. Hayajneh, “Detection and prevention of crypto-ransomwareâ€, IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017.
[Online] https://www.computerweekly.com/news/450432488/Ransomware-to-hit-cloud-computing-in-2018-predicts-MIT [last ac-cessed 2018/04/10]
[Online] https://cybersecurityventures.com/ransomware-damage-report-2017-5-billion/ [ last accessed 2018/04/10]
[Online] https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet [ last accessed 2018/04/11]