{"title":"识别和减轻攻击的安全框架","authors":"L. Thirupathi, V. N. R. Padmanabhuni","doi":"10.35940/ijies.h0963.035820","DOIUrl":null,"url":null,"abstract":"Nowadays security is major concern for any user connected to the internet. Various types of attacks are to be performed by intruders to obtaining user information as man- inmiddle attack, denial of service, malware attacks etc. Malware attacks specifically ransomware attack become very famous recently. Ransomware attack threaten the users by encrypting their most valuable data, lock the user screen, play some random videos and by various more means. Finally attacker takes benefits by users through paid ransom. In this paper, we propose a framework which prevents the ransomware attack more appropriately using various techniques as block chain, honeypot, cloud & edge computing. This framework is analyzed mainly through the IoT devices and generalized to the any malware attack.","PeriodicalId":281681,"journal":{"name":"International Journal of Inventive Engineering and Sciences","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Secured Framework to Identify and Mitigate Attack\",\"authors\":\"L. Thirupathi, V. N. R. Padmanabhuni\",\"doi\":\"10.35940/ijies.h0963.035820\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays security is major concern for any user connected to the internet. Various types of attacks are to be performed by intruders to obtaining user information as man- inmiddle attack, denial of service, malware attacks etc. Malware attacks specifically ransomware attack become very famous recently. Ransomware attack threaten the users by encrypting their most valuable data, lock the user screen, play some random videos and by various more means. Finally attacker takes benefits by users through paid ransom. In this paper, we propose a framework which prevents the ransomware attack more appropriately using various techniques as block chain, honeypot, cloud & edge computing. This framework is analyzed mainly through the IoT devices and generalized to the any malware attack.\",\"PeriodicalId\":281681,\"journal\":{\"name\":\"International Journal of Inventive Engineering and Sciences\",\"volume\":\"131 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Inventive Engineering and Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.35940/ijies.h0963.035820\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Inventive Engineering and Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35940/ijies.h0963.035820","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secured Framework to Identify and Mitigate Attack
Nowadays security is major concern for any user connected to the internet. Various types of attacks are to be performed by intruders to obtaining user information as man- inmiddle attack, denial of service, malware attacks etc. Malware attacks specifically ransomware attack become very famous recently. Ransomware attack threaten the users by encrypting their most valuable data, lock the user screen, play some random videos and by various more means. Finally attacker takes benefits by users through paid ransom. In this paper, we propose a framework which prevents the ransomware attack more appropriately using various techniques as block chain, honeypot, cloud & edge computing. This framework is analyzed mainly through the IoT devices and generalized to the any malware attack.