{"title":"勒索软件的比较研究","authors":"Vivek Kumar Anand, Karunesh Bamanjogi, Aryan Raj Shaw, Mahak Faheem","doi":"10.1109/ICCCS55188.2022.10079369","DOIUrl":null,"url":null,"abstract":"Over the past few years cyberattacks have increased significantly as we have moved to a digital world. In 2021 this number rises drastically. Ransomware Attacks are not only limited to attacking an organization or a group of people to steal/encrypt their data, but it also refers to attacking networks or servers to slow down the services to such an extent thus creating the services unusable for the user, but at the same time, unlike other malware whose detection and analysis is not much complex, in ransomware, we find that they cannot be reverse engineered easily, due to high obfuscation and packing techniques involved. Skilled attackers are always a step ahead thus they find ways to evade the security systems or execute zero-day vulnerabilities.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparative Study of Ransomwares\",\"authors\":\"Vivek Kumar Anand, Karunesh Bamanjogi, Aryan Raj Shaw, Mahak Faheem\",\"doi\":\"10.1109/ICCCS55188.2022.10079369\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the past few years cyberattacks have increased significantly as we have moved to a digital world. In 2021 this number rises drastically. Ransomware Attacks are not only limited to attacking an organization or a group of people to steal/encrypt their data, but it also refers to attacking networks or servers to slow down the services to such an extent thus creating the services unusable for the user, but at the same time, unlike other malware whose detection and analysis is not much complex, in ransomware, we find that they cannot be reverse engineered easily, due to high obfuscation and packing techniques involved. Skilled attackers are always a step ahead thus they find ways to evade the security systems or execute zero-day vulnerabilities.\",\"PeriodicalId\":149615,\"journal\":{\"name\":\"2022 7th International Conference on Computing, Communication and Security (ICCCS)\",\"volume\":\"155 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 7th International Conference on Computing, Communication and Security (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCS55188.2022.10079369\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS55188.2022.10079369","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Over the past few years cyberattacks have increased significantly as we have moved to a digital world. In 2021 this number rises drastically. Ransomware Attacks are not only limited to attacking an organization or a group of people to steal/encrypt their data, but it also refers to attacking networks or servers to slow down the services to such an extent thus creating the services unusable for the user, but at the same time, unlike other malware whose detection and analysis is not much complex, in ransomware, we find that they cannot be reverse engineered easily, due to high obfuscation and packing techniques involved. Skilled attackers are always a step ahead thus they find ways to evade the security systems or execute zero-day vulnerabilities.