Skip to main content

Part of the book series: SpringerBriefs on Cyber Security Systems and Networks ((BRIEFSCSSN))

  • 1072 Accesses

Abstract

Ramsonware is a malware of its kind and is growing rapidly. There is an urgency to take this matter seriously. Honeypot which very few focus on is an excellence tool to gather information of ransomware. To deal with ransomware, it is important to understand the payment system, bitcoin. The proposal of using honeytoken to track the location of the receiver of bitcoin can help find the root of the cause.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Gazet, Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)

    Article  Google Scholar 

  2. M.H.U. Salvi and M.R.V. Kerkar, Ransomware: A cyber extortion (2016)

    Google Scholar 

  3. D.F. Sittig, H. Singh, A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl. Clin. Inf. 7(2), 624 (2016)

    Article  Google Scholar 

  4. S.S. Response, Samsam may signal a new trend of targeted ransomware (2016), https://www.symantec.com/connect/blogs/samsam-may-signal-new-trend-targeted-ransomware

  5. K. Cabaj, P. Gawkowski, K. Grochowski, D. Osojca, Network activity analysis of cryptowall ransomware. Przeglad Elektrotechniczny 91(11), 201–204 (2015)

    Google Scholar 

  6. C. Moore, Detecting ransomware with honeypot techniques, in Cybersecurity and Cyberforensics Conference (CCC), 2016 (IEEE, 2016), pp. 77–81

    Google Scholar 

  7. A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the gordian knot: a look under the hood of ransomware attacks, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, 2015), pp. 3–24

    Chapter  Google Scholar 

  8. T.-M. Koo, H.-C. Chang, Y.-T. Hsu, H.-Y. Lin, Malicious website detection based on honeypot systems, in 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) (Atlantis Press, 2013)

    Google Scholar 

  9. C. Seifert, R. Steenson, I. Welch, P. Komisarczuk, B. Endicott-Popovsky, Capture-a behavioral analysis tool for applications and documents. Digit. Investig. 4(Supplement), 23–30 (2007)

    Article  Google Scholar 

  10. L. Pearce, Malware analysis in a nutshell. Technical Report (Los Alamos National Laboratory (LANL), 2016)

    Google Scholar 

  11. D. McCoy, K. Bauer, D. Grunwald, T. Kohno, D. Sicker, Shining light in dark places: understanding the tor network, in International Symposium on Privacy Enhancing Technologies Symposium (Springer, 2008), pp. 63–76

    Google Scholar 

  12. B.M. Bowen, M.B. Salem, A.D. Keromytis, S.J. Stolfo, Monitoring technologies for mitigating insider threats, in Insider Threats in Cyber Security (Springer, 2010), pp. 197–217

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chee Keong Ng .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ng, C.K., Pan, L., Xiang, Y. (2018). Ramsonware and Honeypot. In: Honeypot Frameworks and Their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7739-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7739-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7738-8

  • Online ISBN: 978-981-10-7739-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics