Detection of Ransomware in Emails Through Anomaly Based Detection

  • S. SureshEmail author
  • M. Mohan
  • C. Thyagarajan
  • R. Kedar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)


In the recent years Email has been the popular mode of communication. We can connect or send message to anyone in any part of the world with the help of Email. Email is said to be advanced version of communication. There are also certain disadvantages of using the Email. Some of the disadvantages are privacy, phishing Emails, Spamming, Malware, Spam and much more. Out of which the Ransomware through Email are being common in the recent years. Ransomware is one of the serious problems that are found on the web. It is a form of malicious content or software that encrypts the data on our system making it unavailable for us to use. In a simpler manner it locks out the files, folders and subfolders in our system. And now-a-days Ransomware is spread through phishing Emails and the attackers charge a lot for it. Ransomware is not a virus but, it is a malicious software that locks us out of our own systems. There are two types of Ransomware that can be spread through Email, one of which is crypto ransomware and the other is the locker ransomware. In this paper we are going to discuss about the Ransomware through Email and how it harms our system and also we are going to discuss about how to overcome or prevent ransomware.


Email security Network security Ransomware Malware Phishing Spamming 


  1. 1.
    Ransomware: Fake Federal German Police (BKA) notice, SecureList (Kaspersky Lab). Accessed 10 Mar 2012Google Scholar
  2. 2.
    Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: IEEE Symposium on Security and Privacy, pp. 129–135 (1996). ISBN 0-8186-7417-2.
  3. 3.
    You’re infected—if you want to see your data again, pay us $300 in Bitcoins, ArsTechnica, 17 October 2013. Accessed 23 Oct 2013Google Scholar
  4. 4.
    Pathak, P.B.: A dangerous trend of cybercrime: ransomware growing challenge. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 5(2), 169–174 (2016). ISSN 2278-1323Google Scholar
  5. 5.
    MahmudhaFasheem, S., Kanimozhi, P., AkoraMurthy, P.: Detection and avoidance of ransomware. International Journal of Engineering Development and Research 5(1), 254–260 (2017). ISSN 2321-9939Google Scholar
  6. 6.
    The computer emergency Response team Mauritius (CERT-MU), The Petya Cyber-attack, Whitepaper (2017)Google Scholar
  7. 7.
    Gonzalez, D., Hayajneh, T.: Detection and prevention of Crypto-ransomware. IEEE (2017). 978-1-5386-1104-3/17Google Scholar
  8. 8.
    Malvertising campaign delivers digitally signed CryptoWallransomware. PC World, 29 Sept 2014. Accessed 25 June 2015Google Scholar
  9. 9.
    Palmer, D.: Bad Rabbit ransomware: A new variant of Petya is spreading, warn researchers. ZDNet. Accessed 24 Oct 2017Google Scholar
  10. 10.
    Mohurle, S., Patil, M.: A brief study of Wannacry threat: ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 159–164 (2017). ISSN No 0976-5697Google Scholar
  11. 11.
    Jyothsna, V., Prasad, V.V.R., Prasad, K.M.: A review of anomaly based intrusion detection systems. Int. J. Comput. Appl. 28(7), 125–134 (2011). (0975–8887)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Sathyabama Institute of Science and TechnologyChennaiIndia
  2. 2.Department of Computer Science and EngineeringPanimalar Engineering CollegeChennaiIndia

Personalised recommendations