Amos Ren
A three-level ransomware detection and prevention mechanism
Ren, Amos; Liang, Chong; Hyug, Im Jun; Brohi, Sarfraz Nawaz; Jhanjhi, N. Z.
Authors
Chong Liang
Im Jun Hyug
Sarfraz Nawaz Brohi
N. Z. Jhanjhi
Abstract
Ransomware encrypts victim's files or locks users out of the system. Victims will have to pay the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals and companies through email attachments and download links. NotPetya has worm-like capabilities and exploits EternalBlue and EternalRomance vulnerabilities. Protection methods include vaccination, applying patches, et cetera. Challenges faced to combat ransomware include social engineering, outdated infrastructures, technological advancements, backup issues, and conflicts of standards. Three- Level Security (3LS) is a solution to ransomware that utilizes virtual machines along with browser extensions to perform a scan, on any files that the user wishes to download from the Internet. The downloaded files would be sent over a cloud server relay to a virtual machine by a browser extension. Any changes to the virtual machine after downloading the file would be observed, and if there were a malfunction in the virtual machine, the file would not be retrieved to the user's system.
Journal Article Type | Article |
---|---|
Acceptance Date | Dec 29, 2019 |
Online Publication Date | Jan 14, 2020 |
Publication Date | Jan 14, 2020 |
Deposit Date | Sep 9, 2022 |
Publicly Available Date | Sep 9, 2022 |
Journal | EAI Endorsed Transactions on Energy Web |
Electronic ISSN | 2032-944X |
Peer Reviewed | Peer Reviewed |
Volume | 7 |
Issue | 26 |
Pages | 162691 |
DOI | https://doi.org/10.4108/eai.13-7-2018.162691 |
Keywords | Malware, Petya, Ransomware, Security, Virtual Machine |
Public URL | https://uwe-repository.worktribe.com/output/9941010 |
Publisher URL | https://eudl.eu/doi/10.4108/eai.13-7-2018.162691 |
Files
A three-level ransomware detection and prevention mechanism
(2.2 Mb)
PDF
Licence
http://creativecommons.org/licenses/by/3.0/
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/3.0/
Copyright Statement
Copyright © 2020 Amos Loh Yee Ren et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.
You might also like
UAV’s applications, architecture, security issues and attack scenarios: A survey
(2020)
Book Chapter
A data tracking and monitoring mechanism
(2020)
Book Chapter
Identifying and analyzing the transient and permanent barriers for big data
(2016)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search