Ikra Afzal Chesti, M. Humayun, N. Sama, Noor Zaman Jhanjhi
{"title":"Evolution, Mitigation, and Prevention of Ransomware","authors":"Ikra Afzal Chesti, M. Humayun, N. Sama, Noor Zaman Jhanjhi","doi":"10.1109/ICCIS49240.2020.9257708","DOIUrl":null,"url":null,"abstract":"Tremendous growth of ransom malware demands valuable security methods to protect individuals and organizations. Ransomware or ransom malware is a type of malware that restricts users from accessing their files or system and demands a ransom payment to get back access to files. The hacked files are encrypted and asked for payment to decrypt and redeliver the files back to the user. To regain access back to hacked files one has to make digital payment. Ransomware of this type is dangerous as it hacks all the files and fails all the security methods available on the system also the possibility for retrieving your file is zero percent. Even if the payment is done still one cannot be sure that files will be delivered back to the user. The earliest ransomware came into existence in 1980, at that time one has to pay through snail mail. Ransomware is considered as the most widespread malware since 1989 and had caused global financial losses both to individuals and big organizations. Every year this loss is increasing. Therefore, protection of our data from ransomware is necessary. Today, originators of ransomware demand for payment via bitcoins or cryptocurrency. This paper provides the detailed overview about ransomware, its evolution, the reasons for paying or not paying a ransom, the existing approaches to avoid this problem, and the recovery techniques in case of infection.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIS49240.2020.9257708","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Tremendous growth of ransom malware demands valuable security methods to protect individuals and organizations. Ransomware or ransom malware is a type of malware that restricts users from accessing their files or system and demands a ransom payment to get back access to files. The hacked files are encrypted and asked for payment to decrypt and redeliver the files back to the user. To regain access back to hacked files one has to make digital payment. Ransomware of this type is dangerous as it hacks all the files and fails all the security methods available on the system also the possibility for retrieving your file is zero percent. Even if the payment is done still one cannot be sure that files will be delivered back to the user. The earliest ransomware came into existence in 1980, at that time one has to pay through snail mail. Ransomware is considered as the most widespread malware since 1989 and had caused global financial losses both to individuals and big organizations. Every year this loss is increasing. Therefore, protection of our data from ransomware is necessary. Today, originators of ransomware demand for payment via bitcoins or cryptocurrency. This paper provides the detailed overview about ransomware, its evolution, the reasons for paying or not paying a ransom, the existing approaches to avoid this problem, and the recovery techniques in case of infection.