Advanced Petya Ransomware and Mitigation Strategies

Jagmeet Singh Aidan, Zeenia, Urvashi Garg
{"title":"Advanced Petya Ransomware and Mitigation Strategies","authors":"Jagmeet Singh Aidan, Zeenia, Urvashi Garg","doi":"10.1109/ICSCCC.2018.8703323","DOIUrl":null,"url":null,"abstract":"In this cyber era, the cyber threats have reached a new level of menace and maturity. One of the major threat in this cyber world nowadays is ransomware attack which had affected millions of computers. Ransomware locks the valuable data with often unbreakable encryption codes making it inaccessible for both organization and consumers, thus demanding heavy ransom to decrypt the data. In this paper, advanced and improved version of the Petya ransomware has been introduced which has a reduced anti-virus detection of 33% which actually was 71% with the original version. System behavior is also monitored during the attack and analysis of this behavior is performed and described. Along with the behavioral analysis two mitigation strategies have also been proposed to defend the systems from the ransomware attack. This multi-layered approach for the security of the system will minimize the rate of infection as cybercriminals continue to refine their tactics, making it difficult for the organization’s complacent development.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC.2018.8703323","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

In this cyber era, the cyber threats have reached a new level of menace and maturity. One of the major threat in this cyber world nowadays is ransomware attack which had affected millions of computers. Ransomware locks the valuable data with often unbreakable encryption codes making it inaccessible for both organization and consumers, thus demanding heavy ransom to decrypt the data. In this paper, advanced and improved version of the Petya ransomware has been introduced which has a reduced anti-virus detection of 33% which actually was 71% with the original version. System behavior is also monitored during the attack and analysis of this behavior is performed and described. Along with the behavioral analysis two mitigation strategies have also been proposed to defend the systems from the ransomware attack. This multi-layered approach for the security of the system will minimize the rate of infection as cybercriminals continue to refine their tactics, making it difficult for the organization’s complacent development.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
高级Petya勒索软件和缓解策略
在网络时代,网络威胁的威胁程度和成熟度都达到了新的高度。当今网络世界的主要威胁之一是勒索软件攻击,它已经影响了数百万台计算机。勒索软件通常用无法破解的加密代码锁定有价值的数据,使组织和消费者都无法访问这些数据,因此需要支付高额赎金才能解密数据。在本文中,介绍了Petya勒索软件的高级和改进版本,该版本的反病毒检测率降低了33%,而原始版本的反病毒检测率为71%。在攻击期间还监视系统行为,并执行和描述对该行为的分析。除了行为分析外,还提出了两种缓解策略来保护系统免受勒索软件攻击。随着网络犯罪分子不断改进他们的策略,这种多层次的系统安全方法将最大限度地降低感染率,使组织难以自满发展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
To Alleviate The Flooding Attack and Intensify Efficiency in MANET Deep Leaming Approaches for Brain Tumor Segmentation: A Review Q-AODV: A Flood control Ad-Hoc on Demand Distance Vector Routing Protocol Sentimental Analysis On Social Feeds to Predict the Elections A Comparative study of various Video Tampering detection methods
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1