Advertisement

Ransomware Attack Protection: A Cryptographic Approach

  • Anjali Kumari
  • Md Zakirul Alam Bhuiyan
  • Jigyasa Namdeo
  • Shipra Kanaujia
  • Ruhul Amin
  • Satyanarayana VollalaEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)

Abstract

Ransomware is a type of malicious software that tampers the data of an organization or an individual. For this, the attacker threatens the victim to pay a big ransom amount against the data. They seek payments through digital currencies such as bitcoins. There are no perfect techniques to detect and block a ransomware attack. But, there are a lot of preventive techniques that help organizations to protect the data from ransom attacks. The existing methods are not providing all the security services such as availability. Even if there is an availability still cryptographic operations can be performed to change the form of content. This makes impossible for the user to retrieve the original information. To overcome this drawback, we propose a technique called Ransom Protect Algorithm. In this algorithm, we present a method of locking the file for preventing the ransom attack. Thereby, ensuring that no other process can access and perform an encryption operation on the locked file.

Keywords

Ransomware Encryption Cryptoviral extortion Bitcoins Cryptography 

References

  1. 1.
    Scaife, N., Carter, H., Traynor, P., Butler, K.R.B.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303–312. IEEE (2016)Google Scholar
  2. 2.
    Mohurle, S., Patil, M.: A brief study of wannacry threat: ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 1938–1940 (2017) Google Scholar
  3. 3.
    O’Kane, P., Sezer, S., Carlin, D.: Evolution of ransomware. IET Netw. 7(5), 321–327 (2018)CrossRefGoogle Scholar
  4. 4.
    Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 129–140. IEEE (1996)Google Scholar
  5. 5.
    Kharraz, A., Robertson, W., Kirda, E.: Protecting against ransomware: a new line of research or restating classic ideas? IEEE Secur. Priv. 16(3), 103–107 (2018)CrossRefGoogle Scholar
  6. 6.
    Salvi, M.H.U., Kerkar, M.R.V.: Ransomware: a cyber extortion. Asian J. Convergence Technol. (AJCT)-UGC LISTED 2, 1–6 (2016) Google Scholar
  7. 7.
    Ami, O., Elovici, Y., Hendler, D.: Ransomware prevention using application authentication-based file access control. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, pp. 1610–1619. ACM (2018)Google Scholar
  8. 8.
    Genç, Z.A., Lenzini, G., Ryan, P.Y.A.: No random, no ransom: a key to stop cryptographic ransomware. In: Giuffrida, C., Bardin, S., Blanc, G. (eds.) DIMVA 2018. LNCS, vol. 10885, pp. 234–255. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-93411-2_11CrossRefGoogle Scholar
  9. 9.
    Shukla, M., Mondal, S., Lodha, S.: Poster: locally virtualized environment for mitigating ransomware threat. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1784–1786. ACM (2016)Google Scholar
  10. 10.
    Song, S., Kim, B., Lee, S.: The effective ransomware prevention technique using process monitoring on android platform. Mob. Inf. Syst. 2016, 1–10 (2016). Article ID 2946735 Google Scholar
  11. 11.
    Al-rimy, B.A.S., Maarof, M.A., Shaid, S.Z.M.: Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput. Secur. 74, 144–166 (2018)CrossRefGoogle Scholar
  12. 12.
    Cabaj, K., Gregorczyk, M., Mazurczyk, W.: Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. Comput. Electr. Eng. 66, 353–368 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Anjali Kumari
    • 1
  • Md Zakirul Alam Bhuiyan
    • 2
  • Jigyasa Namdeo
    • 1
  • Shipra Kanaujia
    • 1
  • Ruhul Amin
    • 1
  • Satyanarayana Vollala
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringDRSPM International Institute of Information Technology, Naya RaipurAtal NagarIndia
  2. 2.Department of Computer and Information SciencesFordham UniversityBronxUSA

Personalised recommendations