Advertisement

Awareness Learning Analysis of Malware and Ransomware in Bitcoin

  • Garima JainEmail author
  • Nisha Rani
Conference paper
  • 77 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 121)

Abstract

Ransomware is a subset of malware in which it typically enables cyberextortion for financial gain. It is a serious and growing cyberthreat that often affects an individual’s privacy. It has recently made headlines for border attacks on businesses. It results in loss of sensitive information, disruption, regular operations, and damage to an organization’s reputation. It spreads through phishing emails that contain malicious attachments or through drive-by downloading. It occurs when a user visits an infected website unknowingly and then malware is downloaded and installed without the acknowledgment of the user. This paper provides a brief of ransomware’s history and as well as preventive measures and solutions to network security, data privacy, and menace of ransomware that challenge computer.

Keywords

Ransomware Malware Cryptovirus Crypto-Trojan Cryptoworm Cybercrime 

References

  1. 1.
    Salvi, M.H.U., Kerkar, R.V.: Ransomware: a cyber extortion. Asian J. Converg. Technol. (AJCT) 2, 1–6 (2016)Google Scholar
  2. 2.
    Luo, X., Liao, Q.: Awareness education as the key to ransomware prevention. Inf. Syst. Secur. 16(4), 195–202 (2007)CrossRefGoogle Scholar
  3. 3.
    Alessandrini, A.: RANSOMWARE: Hostage Rescue Manual. Knownbe4Google Scholar
  4. 4.
    Chen, Q., Bridges, R.A.: Automated behavioral analysis of malware: a case study of WannaCry ransomware. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, Cancun, Mexico (2017)Google Scholar
  5. 5.
    Al-rimy, B.A.S., Maarof, M.A., Shaid, S.Z.M.: Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput. Secur. 74, 144–166 (2018)CrossRefGoogle Scholar
  6. 6.
    Garg, D., et al.: A past examination and future expectations: ransomware. In: 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, Paris (2018)Google Scholar
  7. 7.
    Huang, D.Y., et al.: Tracking ransomware end-to-end. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE, The Hyatt Regency, San Francisco, CA (2018)Google Scholar
  8. 8.
    Pathak, P.B., Nanded, Y.M.: A dangerous trend of cybercrime: ransomware growing challenge. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 5(2), 371–373 (2016)Google Scholar
  9. 9.
    Liao, K., et al.: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime). IEEE, pp. 1–13 (2016)Google Scholar
  10. 10.
    Reid, F., Harrigan, M.: An Analysis of Anonymity in the Bitcoin System. Springer, New York, NY (2013)CrossRefGoogle Scholar
  11. 11.
    Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp. 34–51 (2013)Google Scholar
  12. 12.
    Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp. 6–24 (2013)Google Scholar
  13. 13.
    Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM (2013)Google Scholar
  14. 14.
    Spagnuolo, M., Maggi, F., Zanero, S.: Bitiodine: extracting intelligence from the bitcoin network. In: Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp. 457–468 (2014)Google Scholar
  15. 15.
    Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: eCrime Researchers Summit (eCRS), 2013, pp. 1–14. IEEE (2013)Google Scholar
  16. 16.
    Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, Berlin, Heidelberg (2005)Google Scholar
  17. 17.
    Ducklin, P.: “Locky” ransomware what you need to know. https://nakedsecurity.sophos.com/2016/02/17/locky-ransomware-whatyou-need-to-know/
  18. 18.
    Kan, M.: Paying the WannaCry ransom will probably get you nothing. Here’s why. https://www.pcworld.com/article/3196880/security/paying-thewannacry-ransom-will-probably-get-you-nothing-heres-why.html
  19. 19.
    Hampton, N., Baig, Z.A.: Ransomware: emergence of the cyber-extortion menace. Edith Cowan University, Joondalup Campus, Perth, Western Australia (2015)Google Scholar
  20. 20.
    Surati, S.B., Prajapati, G.I.: A review on ransomware detection and prevention. IJRSI IV, 86–91 (2017)Google Scholar
  21. 21.
  22. 22.
    Song, S., Kim, B., Lee, S.: The effective ransomware prevention technique using process monitoring on android platform. Mob. Inf. Syst. 2016, 1–9 (2016)Google Scholar
  23. 23.
    Truta, F.: The evolution of ransomware in 2018. Bitdefender 2018 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Swami Vivekanad Subharti UniversityMeerutIndia

Personalised recommendations