Abstract
Ramsonware is a malware of its kind and is growing rapidly. There is an urgency to take this matter seriously. Honeypot which very few focus on is an excellence tool to gather information of ransomware. To deal with ransomware, it is important to understand the payment system, bitcoin. The proposal of using honeytoken to track the location of the receiver of bitcoin can help find the root of the cause.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Gazet, Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)
M.H.U. Salvi and M.R.V. Kerkar, Ransomware: A cyber extortion (2016)
D.F. Sittig, H. Singh, A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl. Clin. Inf. 7(2), 624 (2016)
S.S. Response, Samsam may signal a new trend of targeted ransomware (2016), https://www.symantec.com/connect/blogs/samsam-may-signal-new-trend-targeted-ransomware
K. Cabaj, P. Gawkowski, K. Grochowski, D. Osojca, Network activity analysis of cryptowall ransomware. Przeglad Elektrotechniczny 91(11), 201–204 (2015)
C. Moore, Detecting ransomware with honeypot techniques, in Cybersecurity and Cyberforensics Conference (CCC), 2016 (IEEE, 2016), pp. 77–81
A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the gordian knot: a look under the hood of ransomware attacks, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, 2015), pp. 3–24
T.-M. Koo, H.-C. Chang, Y.-T. Hsu, H.-Y. Lin, Malicious website detection based on honeypot systems, in 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) (Atlantis Press, 2013)
C. Seifert, R. Steenson, I. Welch, P. Komisarczuk, B. Endicott-Popovsky, Capture-a behavioral analysis tool for applications and documents. Digit. Investig. 4(Supplement), 23–30 (2007)
L. Pearce, Malware analysis in a nutshell. Technical Report (Los Alamos National Laboratory (LANL), 2016)
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, D. Sicker, Shining light in dark places: understanding the tor network, in International Symposium on Privacy Enhancing Technologies Symposium (Springer, 2008), pp. 63–76
B.M. Bowen, M.B. Salem, A.D. Keromytis, S.J. Stolfo, Monitoring technologies for mitigating insider threats, in Insider Threats in Cyber Security (Springer, 2010), pp. 197–217
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Ng, C.K., Pan, L., Xiang, Y. (2018). Ramsonware and Honeypot. In: Honeypot Frameworks and Their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-10-7739-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-7739-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7738-8
Online ISBN: 978-981-10-7739-5
eBook Packages: Computer ScienceComputer Science (R0)