保护物联网:勒索软件攻击、检测、对策和未来前景的全面回顾

Peizhi Yan, Tala Talaei Khoei
{"title":"保护物联网:勒索软件攻击、检测、对策和未来前景的全面回顾","authors":"Peizhi Yan,&nbsp;Tala Talaei Khoei","doi":"10.1016/j.fraope.2025.100256","DOIUrl":null,"url":null,"abstract":"<div><div>Ransomware attacks present a critical and persistent threat by denying access to data until a ransom is paid. Although existing research on IoT ransomware often concentrates on specific attack types or industry sectors, it frequently overlooks newly emerging threats and lacks holistic defense frameworks applicable across diverse IoT ecosystems. To bridge these gaps, this paper provides a comprehensive analysis of the evolving ransomware landscape targeting IoT devices. We systematically review and categorize detection technologies—ranging from signature-based methods to cutting-edge AI-driven solutions—and assess their effectiveness in mitigating these threats. Additionally, we propose a multi-layered defensive strategy integrating technological, legal, and policy measures to address the complexities of ransomware in IoT settings. Looking ahead, our study highlights potential research directions such as advancing real-time detection, leveraging blockchain for enhanced security and fostering cross-sector collaboration to bolster collective threat intelligence. By emphasizing the importance of a unified approach that involves researchers, industry professionals, and policymakers, we underline the critical steps necessary to fortify IoT infrastructures against the ever-evolving ransomware threat.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"11 ","pages":"Article 100256"},"PeriodicalIF":0.0000,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing the internet of things: A comprehensive review of ransomware attacks, detection, countermeasures, and future prospects\",\"authors\":\"Peizhi Yan,&nbsp;Tala Talaei Khoei\",\"doi\":\"10.1016/j.fraope.2025.100256\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Ransomware attacks present a critical and persistent threat by denying access to data until a ransom is paid. Although existing research on IoT ransomware often concentrates on specific attack types or industry sectors, it frequently overlooks newly emerging threats and lacks holistic defense frameworks applicable across diverse IoT ecosystems. To bridge these gaps, this paper provides a comprehensive analysis of the evolving ransomware landscape targeting IoT devices. We systematically review and categorize detection technologies—ranging from signature-based methods to cutting-edge AI-driven solutions—and assess their effectiveness in mitigating these threats. Additionally, we propose a multi-layered defensive strategy integrating technological, legal, and policy measures to address the complexities of ransomware in IoT settings. Looking ahead, our study highlights potential research directions such as advancing real-time detection, leveraging blockchain for enhanced security and fostering cross-sector collaboration to bolster collective threat intelligence. By emphasizing the importance of a unified approach that involves researchers, industry professionals, and policymakers, we underline the critical steps necessary to fortify IoT infrastructures against the ever-evolving ransomware threat.</div></div>\",\"PeriodicalId\":100554,\"journal\":{\"name\":\"Franklin Open\",\"volume\":\"11 \",\"pages\":\"Article 100256\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2025-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Franklin Open\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2773186325000465\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Franklin Open","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2773186325000465","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

勒索软件攻击通过拒绝访问数据,直到支付赎金,呈现出严重和持续的威胁。尽管对物联网勒索软件的现有研究通常集中在特定的攻击类型或行业部门,但它经常忽视新出现的威胁,并且缺乏适用于各种物联网生态系统的整体防御框架。为了弥补这些差距,本文对针对物联网设备的不断发展的勒索软件景观进行了全面分析。我们系统地审查和分类检测技术——从基于签名的方法到尖端的人工智能驱动的解决方案——并评估它们在缓解这些威胁方面的有效性。此外,我们提出了一种多层防御策略,集成了技术、法律和政策措施,以解决物联网环境中勒索软件的复杂性。展望未来,我们的研究强调了潜在的研究方向,如推进实时检测,利用区块链增强安全性,促进跨部门合作以加强集体威胁情报。通过强调涉及研究人员、行业专业人士和政策制定者的统一方法的重要性,我们强调了加强物联网基础设施抵御不断发展的勒索软件威胁所需的关键步骤。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Securing the internet of things: A comprehensive review of ransomware attacks, detection, countermeasures, and future prospects
Ransomware attacks present a critical and persistent threat by denying access to data until a ransom is paid. Although existing research on IoT ransomware often concentrates on specific attack types or industry sectors, it frequently overlooks newly emerging threats and lacks holistic defense frameworks applicable across diverse IoT ecosystems. To bridge these gaps, this paper provides a comprehensive analysis of the evolving ransomware landscape targeting IoT devices. We systematically review and categorize detection technologies—ranging from signature-based methods to cutting-edge AI-driven solutions—and assess their effectiveness in mitigating these threats. Additionally, we propose a multi-layered defensive strategy integrating technological, legal, and policy measures to address the complexities of ransomware in IoT settings. Looking ahead, our study highlights potential research directions such as advancing real-time detection, leveraging blockchain for enhanced security and fostering cross-sector collaboration to bolster collective threat intelligence. By emphasizing the importance of a unified approach that involves researchers, industry professionals, and policymakers, we underline the critical steps necessary to fortify IoT infrastructures against the ever-evolving ransomware threat.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信