勒索软件的演变、缓解和预防

Ikra Afzal Chesti, M. Humayun, N. Sama, Noor Zaman Jhanjhi
{"title":"勒索软件的演变、缓解和预防","authors":"Ikra Afzal Chesti, M. Humayun, N. Sama, Noor Zaman Jhanjhi","doi":"10.1109/ICCIS49240.2020.9257708","DOIUrl":null,"url":null,"abstract":"Tremendous growth of ransom malware demands valuable security methods to protect individuals and organizations. Ransomware or ransom malware is a type of malware that restricts users from accessing their files or system and demands a ransom payment to get back access to files. The hacked files are encrypted and asked for payment to decrypt and redeliver the files back to the user. To regain access back to hacked files one has to make digital payment. Ransomware of this type is dangerous as it hacks all the files and fails all the security methods available on the system also the possibility for retrieving your file is zero percent. Even if the payment is done still one cannot be sure that files will be delivered back to the user. The earliest ransomware came into existence in 1980, at that time one has to pay through snail mail. Ransomware is considered as the most widespread malware since 1989 and had caused global financial losses both to individuals and big organizations. Every year this loss is increasing. Therefore, protection of our data from ransomware is necessary. Today, originators of ransomware demand for payment via bitcoins or cryptocurrency. This paper provides the detailed overview about ransomware, its evolution, the reasons for paying or not paying a ransom, the existing approaches to avoid this problem, and the recovery techniques in case of infection.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Evolution, Mitigation, and Prevention of Ransomware\",\"authors\":\"Ikra Afzal Chesti, M. Humayun, N. Sama, Noor Zaman Jhanjhi\",\"doi\":\"10.1109/ICCIS49240.2020.9257708\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Tremendous growth of ransom malware demands valuable security methods to protect individuals and organizations. Ransomware or ransom malware is a type of malware that restricts users from accessing their files or system and demands a ransom payment to get back access to files. The hacked files are encrypted and asked for payment to decrypt and redeliver the files back to the user. To regain access back to hacked files one has to make digital payment. Ransomware of this type is dangerous as it hacks all the files and fails all the security methods available on the system also the possibility for retrieving your file is zero percent. Even if the payment is done still one cannot be sure that files will be delivered back to the user. The earliest ransomware came into existence in 1980, at that time one has to pay through snail mail. Ransomware is considered as the most widespread malware since 1989 and had caused global financial losses both to individuals and big organizations. Every year this loss is increasing. Therefore, protection of our data from ransomware is necessary. Today, originators of ransomware demand for payment via bitcoins or cryptocurrency. This paper provides the detailed overview about ransomware, its evolution, the reasons for paying or not paying a ransom, the existing approaches to avoid this problem, and the recovery techniques in case of infection.\",\"PeriodicalId\":425637,\"journal\":{\"name\":\"2020 2nd International Conference on Computer and Information Sciences (ICCIS)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 2nd International Conference on Computer and Information Sciences (ICCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIS49240.2020.9257708\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIS49240.2020.9257708","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

勒索软件的急剧增长需要有价值的安全方法来保护个人和组织。勒索软件或勒索软件是一种恶意软件,它限制用户访问他们的文件或系统,并要求支付赎金才能重新访问文件。被入侵的文件被加密,并要求支付解密费用,然后将文件重新传送给用户。要想重新访问被黑客入侵的文件,必须进行数字支付。这种类型的勒索软件是危险的,因为它攻击了所有的文件,并且失败了系统上可用的所有安全方法,并且检索文件的可能性为零。即使付款完成了,也不能确定文件是否会被交付给用户。最早的勒索软件出现在1980年,当时人们必须通过蜗牛邮件付款。勒索软件被认为是自1989年以来传播最广的恶意软件,给个人和大型组织造成了全球经济损失。这种损失每年都在增加。因此,保护我们的数据免受勒索软件的侵害是必要的。今天,勒索软件的发起者要求通过比特币或加密货币支付。本文详细介绍了勒索软件的发展、支付或不支付赎金的原因、现有的避免这一问题的方法以及在感染的情况下的恢复技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Evolution, Mitigation, and Prevention of Ransomware
Tremendous growth of ransom malware demands valuable security methods to protect individuals and organizations. Ransomware or ransom malware is a type of malware that restricts users from accessing their files or system and demands a ransom payment to get back access to files. The hacked files are encrypted and asked for payment to decrypt and redeliver the files back to the user. To regain access back to hacked files one has to make digital payment. Ransomware of this type is dangerous as it hacks all the files and fails all the security methods available on the system also the possibility for retrieving your file is zero percent. Even if the payment is done still one cannot be sure that files will be delivered back to the user. The earliest ransomware came into existence in 1980, at that time one has to pay through snail mail. Ransomware is considered as the most widespread malware since 1989 and had caused global financial losses both to individuals and big organizations. Every year this loss is increasing. Therefore, protection of our data from ransomware is necessary. Today, originators of ransomware demand for payment via bitcoins or cryptocurrency. This paper provides the detailed overview about ransomware, its evolution, the reasons for paying or not paying a ransom, the existing approaches to avoid this problem, and the recovery techniques in case of infection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信