Skip to main content

Ransomware Attack Protection: A Cryptographic Approach

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2019)

Abstract

Ransomware is a type of malicious software that tampers the data of an organization or an individual. For this, the attacker threatens the victim to pay a big ransom amount against the data. They seek payments through digital currencies such as bitcoins. There are no perfect techniques to detect and block a ransomware attack. But, there are a lot of preventive techniques that help organizations to protect the data from ransom attacks. The existing methods are not providing all the security services such as availability. Even if there is an availability still cryptographic operations can be performed to change the form of content. This makes impossible for the user to retrieve the original information. To overcome this drawback, we propose a technique called Ransom Protect Algorithm. In this algorithm, we present a method of locking the file for preventing the ransom attack. Thereby, ensuring that no other process can access and perform an encryption operation on the locked file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Scaife, N., Carter, H., Traynor, P., Butler, K.R.B.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303–312. IEEE (2016)

    Google Scholar 

  2. Mohurle, S., Patil, M.: A brief study of wannacry threat: ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 1938–1940 (2017)

    Google Scholar 

  3. O’Kane, P., Sezer, S., Carlin, D.: Evolution of ransomware. IET Netw. 7(5), 321–327 (2018)

    Article  Google Scholar 

  4. Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 129–140. IEEE (1996)

    Google Scholar 

  5. Kharraz, A., Robertson, W., Kirda, E.: Protecting against ransomware: a new line of research or restating classic ideas? IEEE Secur. Priv. 16(3), 103–107 (2018)

    Article  Google Scholar 

  6. Salvi, M.H.U., Kerkar, M.R.V.: Ransomware: a cyber extortion. Asian J. Convergence Technol. (AJCT)-UGC LISTED 2, 1–6 (2016)

    Google Scholar 

  7. Ami, O., Elovici, Y., Hendler, D.: Ransomware prevention using application authentication-based file access control. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, pp. 1610–1619. ACM (2018)

    Google Scholar 

  8. Genç, Z.A., Lenzini, G., Ryan, P.Y.A.: No random, no ransom: a key to stop cryptographic ransomware. In: Giuffrida, C., Bardin, S., Blanc, G. (eds.) DIMVA 2018. LNCS, vol. 10885, pp. 234–255. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93411-2_11

    Chapter  Google Scholar 

  9. Shukla, M., Mondal, S., Lodha, S.: Poster: locally virtualized environment for mitigating ransomware threat. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1784–1786. ACM (2016)

    Google Scholar 

  10. Song, S., Kim, B., Lee, S.: The effective ransomware prevention technique using process monitoring on android platform. Mob. Inf. Syst. 2016, 1–10 (2016). Article ID 2946735

    Google Scholar 

  11. Al-rimy, B.A.S., Maarof, M.A., Shaid, S.Z.M.: Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput. Secur. 74, 144–166 (2018)

    Article  Google Scholar 

  12. Cabaj, K., Gregorczyk, M., Mazurczyk, W.: Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. Comput. Electr. Eng. 66, 353–368 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satyanarayana Vollala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumari, A., Bhuiyan, M.Z.A., Namdeo, J., Kanaujia, S., Amin, R., Vollala, S. (2019). Ransomware Attack Protection: A Cryptographic Approach. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24907-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24906-9

  • Online ISBN: 978-3-030-24907-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics