Proceedings of the First International Conference on Combinatorial and Optimization, ICCAP 2021, December 7-8 2021, Chennai, India

Research Article

RANSOMWARE: A SURVEY ON VARIOUS ATTACKS AND DEFENSE MECHANISMS

Download369 downloads
  • @INPROCEEDINGS{10.4108/eai.7-12-2021.2314607,
        author={Gomathi  S and K  Anitha Kumari},
        title={RANSOMWARE: A SURVEY ON VARIOUS ATTACKS AND DEFENSE MECHANISMS},
        proceedings={Proceedings of the First International Conference on Combinatorial and Optimization, ICCAP 2021, December 7-8 2021, Chennai, India},
        publisher={EAI},
        proceedings_a={ICCAP},
        year={2021},
        month={12},
        keywords={honeypots cryptoviral extortion crypto-ransomware cryptolocker malware malicious software},
        doi={10.4108/eai.7-12-2021.2314607}
    }
    
  • Gomathi S
    K Anitha Kumari
    Year: 2021
    RANSOMWARE: A SURVEY ON VARIOUS ATTACKS AND DEFENSE MECHANISMS
    ICCAP
    EAI
    DOI: 10.4108/eai.7-12-2021.2314607
Gomathi S1,*, K Anitha Kumari2
  • 1: Dr. N.G.P. Institute of Technology
  • 2: Dr.N.G.P. Institute of Technology
*Contact email: mail2mathi86@gmail.com

Abstract

This paper examines various attacks and the techniques used in ransomware. Ransomware is a form of malicious software (malware) which make an alarm of revealing or denying access to the set of data or computer system, generally by encrypting them, waits till a ransom is paid by victim to the attacker. Ransomware attacks are all around normal nowadays. Cyber offenders attack an organization or a business or an individual those who come from all progress. Besides, a big part of the victims who pay the payment are probably going to experience the ill effects of rehash ransomware attacks, particularly in case it isn't cleaned from the framework. Ransomware was otherwise called "cryptoviral extortion," It is utilized to distinguish the weakness of the objective framework where there is the chance of malware attacks. Cryptowall-a ransomware attacker utilizes the methods ahead of time to penetrate PCs without knowing the person in question. The pernicious programming enters the PC by means of spam messages. Attackers have evolved progressively more innovative over time to time, demanding upgrades that are extremely impossible to track, which aids cybercriminals stay anonymous. In this paper, we look at the overall outline of various attacks and talked about the crypto-ware malware methodologies.