Abstract
Never in the history of humanity, people all over the world are subject to exaction on a huge scale as they are today. In the recent years, the usage of PCs and the Internet has exploded and, along with this huge increase, cybercrooks have come to feed this souk, aiming acquitted consumers with a wide range of per-ware. Most of these threats are meant unswervingly or meanderingly in receiving currency from victims. Today, the ransomware appears to be one of the most unpleasant per-ware categories of the time. Several works have been published in the field of information and Internet security, various pernicious attacks, and cryptography. The objective of this research paper is to present everything with regard to latest crypto-virus trend known as ransomware. The paper explains the history, the modus operandi as well as the architecture of ransomware attack.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Young, A. L., & Yung, M. (2017). Cryptovirology: The birth, neglect, and explosion of ransomware. Communications of the ACM, 60(7), 24–26.
Mercaldo, F., Nardone, V., & Santone, A. (2016, August). Ransomware inside out. In 2016 11th International Conference on Availability, Reliability and Security (ARES) (pp. 628–637). IEEE.
Unit 42 Palo Alto Networks Threat Report—Ransomware: Unlocking the Lucrative Criminal Business Model (2016, May). Retrieved June 21, 2017. https://www.paloaltonetworks.com/resources/research/ransomware-report.
Deloitte Threat Intelligence and Analytics Report (2016). Retrieved June 21, 2017. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk/us-aers-ransomware.pdf.
Symantec Security Response Whitepaper. The evolution of ransomware (2015, August). Retrieved June 19, 2017. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf.
Orman, H. (2016). Evil offspring-ransomware and crypto technology. IEEE Internet Computing, 20(5), 89–94.
McAfee Whitepaper—Understanding Ransomware and Strategies to Defeat it (2016). Retrieved June 21, 2017. https://www.mcafee.com/in/resources/white-papers/wp-understanding-ransomware-strategies-defeat.pdf.
Liska, A., & Gallo, T. (2017). Ransomware: Defending against digital extortion. Beijing; Boston; Farnham; Sebastopol; Tokyo: OReilly.
CERT.be (Cyber Emergency Team, Belgium) Ransomware Whitepaper (2016). Retrieved June 21, 2017. https://www.cert.be/files/ransomware_whitepaper.pdf.
Moore, C. (2016, August). Detecting ransomware with honeypot techniques. In Cybersecurity and Cyberforensics Conference (CCC), 2016 (pp. 77–81). IEEE.
Scaife, N., Carter, H., Traynor, P., & Butler, K. R. (2016, June). Cryptolock (and drop it): Stopping ransomware attacks on user data. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) (pp. 303–312). IEEE.
The TOR Project. Retrieved June 21, 2017. https://www.torproject.org/.
Yang, T., Yang, Y., Qian, K., Lo, D. C. T., Qian, Y., & Tao, L. (2015, August). Automated detection and analysis for android ransomware. In 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS) (pp. 1338–1343). IEEE.
Mercaldo, F., Nardone, V., Santone, A., & Visaggio, C. A. (2016, June). Ransomware steals your phone, formal methods rescue it. In International Conference on Formal Techniques for Distributed Objects, Components, and Systems (pp. 212–221). Cham: Springer.
Luo, X., & Liao, Q. (2007). Awareness education as the key to ransomware prevention. Information Systems Security, 16(4), 195–202.
Lee, J. K., Moon, S. Y., & Park, J. H. (2017). CloudRPS: A cloud analysis based enhanced ransomware prevention system. The Journal of Supercomputing, 73(7), 3065–3084.
Mansfield-Devine, S. (2016). Ransomware: Taking businesses hostage. Network Security, 2016(10), 8–17.
Brewer, R. (2016). Ransomware attacks: Detection, prevention and cure. Network Security, 2016(9), 5–9.
Microsoft Security Bulletin MS17–010—Critical (2017, March). Retrieved June 21, 2017. https://technet.microsoft.com/en-us/library/security/ms17-010.aspx.
Double Pulsar NSA leaked hacks in the wild (2017, April). Retrieved June 21, 2017. https://www.wired.com/beyond-the-beyond/2017/04/double-pulsar-nsa-leaked-hacks-wild/.
NSA-leaking Shadow Brokers (2017, April). Retrieved June 20, 2017. https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tandon, A., Nayyar, A. (2019). A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-1274-8_31
Download citation
DOI: https://doi.org/10.1007/978-981-13-1274-8_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1273-1
Online ISBN: 978-981-13-1274-8
eBook Packages: EngineeringEngineering (R0)