一种检测勒索软件威胁的分析技术

S. Mukesh
{"title":"一种检测勒索软件威胁的分析技术","authors":"S. Mukesh","doi":"10.1109/ICCCI.2018.8441502","DOIUrl":null,"url":null,"abstract":"The fast development of Wireless Network has raised a magnificent sensitivity toward security threats. As of now, security is viewed as one of the basic parameter for the acknowledgment of any remote systems administration innovation. Any hub under assault in remote system introduces a typical conduct called the pernicious conduct. In this condition, the whole operation of a system gets vexed and to avert such harmful practices, a few security resolutions have been found. Malware is a typical term that is utilized to characterize the kind of noxious programming that assumes an essential part in security dangers to the PC and Internet. This paper, expects to give a far reaching examination on Malware how digital criminal are utilized to get emancipate from huge organizations by introducing noxious codes on their servers. Having introduced the threats and their related dangers, the review then looks at a portion of the discovery and moderation arrangements accessible.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Analysis Technique to Detect Ransomware Threat\",\"authors\":\"S. Mukesh\",\"doi\":\"10.1109/ICCCI.2018.8441502\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fast development of Wireless Network has raised a magnificent sensitivity toward security threats. As of now, security is viewed as one of the basic parameter for the acknowledgment of any remote systems administration innovation. Any hub under assault in remote system introduces a typical conduct called the pernicious conduct. In this condition, the whole operation of a system gets vexed and to avert such harmful practices, a few security resolutions have been found. Malware is a typical term that is utilized to characterize the kind of noxious programming that assumes an essential part in security dangers to the PC and Internet. This paper, expects to give a far reaching examination on Malware how digital criminal are utilized to get emancipate from huge organizations by introducing noxious codes on their servers. Having introduced the threats and their related dangers, the review then looks at a portion of the discovery and moderation arrangements accessible.\",\"PeriodicalId\":141663,\"journal\":{\"name\":\"2018 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI.2018.8441502\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2018.8441502","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

无线网络的快速发展使人们对安全威胁的敏感度大大提高。到目前为止,安全性被视为确认任何远程系统管理创新的基本参数之一。任何在远程系统中受到攻击的枢纽都会引入一种典型的行为,称为恶意行为。在这种情况下,系统的整个操作变得烦恼,为了避免这种有害的做法,已经找到了一些安全解决方案。恶意软件是一个典型的术语,它被用来描述一种有害的编程,这种编程在PC和互联网的安全危险中扮演着重要的角色。本文希望对恶意软件进行深入的研究,探讨数字犯罪分子如何利用恶意软件在大型组织的服务器上引入有害代码,从而从大型组织中解放出来。在介绍了威胁及其相关的危险之后,审查将查看可访问的发现和审核安排的一部分。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Analysis Technique to Detect Ransomware Threat
The fast development of Wireless Network has raised a magnificent sensitivity toward security threats. As of now, security is viewed as one of the basic parameter for the acknowledgment of any remote systems administration innovation. Any hub under assault in remote system introduces a typical conduct called the pernicious conduct. In this condition, the whole operation of a system gets vexed and to avert such harmful practices, a few security resolutions have been found. Malware is a typical term that is utilized to characterize the kind of noxious programming that assumes an essential part in security dangers to the PC and Internet. This paper, expects to give a far reaching examination on Malware how digital criminal are utilized to get emancipate from huge organizations by introducing noxious codes on their servers. Having introduced the threats and their related dangers, the review then looks at a portion of the discovery and moderation arrangements accessible.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信