Towards Classification and Analysis of Ransomware Detection Techniques

Maneeba Ashraf, Muhammad Asif, M. Ahmad, Ahsan Ayaz, Ayesha Nasir, Umer Ahmad
{"title":"Towards Classification and Analysis of Ransomware Detection Techniques","authors":"Maneeba Ashraf, Muhammad Asif, M. Ahmad, Ahsan Ayaz, Ayesha Nasir, Umer Ahmad","doi":"10.1109/iCoMET57998.2023.10099204","DOIUrl":null,"url":null,"abstract":"Ransomware is a typical malware attack that has been increasing steadily over the last few years. It encrypts users' data or removes significant material. The attackers ask for money to unlock and decrypt the data. In this paper, an analysis of Ransomware attack and its detection techniques is presented. Initially, Ransomware detection techniques are classified based on their working principle. After that, a detailed comparative analysis is made to figure out the suitability of these techniques in different scenarios.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCoMET57998.2023.10099204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Ransomware is a typical malware attack that has been increasing steadily over the last few years. It encrypts users' data or removes significant material. The attackers ask for money to unlock and decrypt the data. In this paper, an analysis of Ransomware attack and its detection techniques is presented. Initially, Ransomware detection techniques are classified based on their working principle. After that, a detailed comparative analysis is made to figure out the suitability of these techniques in different scenarios.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
勒索软件检测技术的分类与分析
勒索软件是一种典型的恶意软件攻击,在过去几年中一直在稳步增长。它会对用户的数据进行加密或删除重要内容。攻击者要钱来解锁和解密数据。本文对勒索软件攻击及其检测技术进行了分析。最初,勒索软件检测技术是根据其工作原理进行分类的。然后进行详细的对比分析,找出这些技术在不同场景下的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evaluating the Effectiveness of Flat Plate Solar Collector for Water Heating in Pakistan Deep learning-based video anonymization for security and privacy Sustainable Performance of Energy sector Organizations through Green Supply Chain Management The Influential factors for Pollution Emissions in manufacturing business Polyimide Substrate based Compact Antenna for Terahertz Wireless Communication Applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1