Maneeba Ashraf, Muhammad Asif, M. Ahmad, Ahsan Ayaz, Ayesha Nasir, Umer Ahmad
{"title":"勒索软件检测技术的分类与分析","authors":"Maneeba Ashraf, Muhammad Asif, M. Ahmad, Ahsan Ayaz, Ayesha Nasir, Umer Ahmad","doi":"10.1109/iCoMET57998.2023.10099204","DOIUrl":null,"url":null,"abstract":"Ransomware is a typical malware attack that has been increasing steadily over the last few years. It encrypts users' data or removes significant material. The attackers ask for money to unlock and decrypt the data. In this paper, an analysis of Ransomware attack and its detection techniques is presented. Initially, Ransomware detection techniques are classified based on their working principle. After that, a detailed comparative analysis is made to figure out the suitability of these techniques in different scenarios.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards Classification and Analysis of Ransomware Detection Techniques\",\"authors\":\"Maneeba Ashraf, Muhammad Asif, M. Ahmad, Ahsan Ayaz, Ayesha Nasir, Umer Ahmad\",\"doi\":\"10.1109/iCoMET57998.2023.10099204\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ransomware is a typical malware attack that has been increasing steadily over the last few years. It encrypts users' data or removes significant material. The attackers ask for money to unlock and decrypt the data. In this paper, an analysis of Ransomware attack and its detection techniques is presented. Initially, Ransomware detection techniques are classified based on their working principle. After that, a detailed comparative analysis is made to figure out the suitability of these techniques in different scenarios.\",\"PeriodicalId\":369792,\"journal\":{\"name\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iCoMET57998.2023.10099204\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCoMET57998.2023.10099204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards Classification and Analysis of Ransomware Detection Techniques
Ransomware is a typical malware attack that has been increasing steadily over the last few years. It encrypts users' data or removes significant material. The attackers ask for money to unlock and decrypt the data. In this paper, an analysis of Ransomware attack and its detection techniques is presented. Initially, Ransomware detection techniques are classified based on their working principle. After that, a detailed comparative analysis is made to figure out the suitability of these techniques in different scenarios.