Maneeba Ashraf, Muhammad Asif, M. Ahmad, Ahsan Ayaz, Ayesha Nasir, Umer Ahmad
{"title":"Towards Classification and Analysis of Ransomware Detection Techniques","authors":"Maneeba Ashraf, Muhammad Asif, M. Ahmad, Ahsan Ayaz, Ayesha Nasir, Umer Ahmad","doi":"10.1109/iCoMET57998.2023.10099204","DOIUrl":null,"url":null,"abstract":"Ransomware is a typical malware attack that has been increasing steadily over the last few years. It encrypts users' data or removes significant material. The attackers ask for money to unlock and decrypt the data. In this paper, an analysis of Ransomware attack and its detection techniques is presented. Initially, Ransomware detection techniques are classified based on their working principle. After that, a detailed comparative analysis is made to figure out the suitability of these techniques in different scenarios.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCoMET57998.2023.10099204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Ransomware is a typical malware attack that has been increasing steadily over the last few years. It encrypts users' data or removes significant material. The attackers ask for money to unlock and decrypt the data. In this paper, an analysis of Ransomware attack and its detection techniques is presented. Initially, Ransomware detection techniques are classified based on their working principle. After that, a detailed comparative analysis is made to figure out the suitability of these techniques in different scenarios.