{"title":"A novel Approach to counter Ransomwares","authors":"Rishi Sharma, Shilpi Sharma","doi":"10.1109/Confluence47617.2020.9058190","DOIUrl":null,"url":null,"abstract":"Studying the variety of the malwares behavior, especially ransomware variants that has a philosophy of kidnapping the data residing on the disk. The Internet has become an essential part of daily life as more and more people use services that are offered on the Internet. Future wars will be cyber wars and the attacks will be a sturdy amalgamation of cryptography along with malware to distort information systems and its security. The explosive Internet growth facilitates cyberattacks.Malware plays an indispensable actor in launching malicious activities to monetize. Also Studying the malware behavior especially, the ransomwares/crypto mining and creating an approach to have a proactive mechanism in place for detection.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Confluence47617.2020.9058190","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Studying the variety of the malwares behavior, especially ransomware variants that has a philosophy of kidnapping the data residing on the disk. The Internet has become an essential part of daily life as more and more people use services that are offered on the Internet. Future wars will be cyber wars and the attacks will be a sturdy amalgamation of cryptography along with malware to distort information systems and its security. The explosive Internet growth facilitates cyberattacks.Malware plays an indispensable actor in launching malicious activities to monetize. Also Studying the malware behavior especially, the ransomwares/crypto mining and creating an approach to have a proactive mechanism in place for detection.