Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/3757
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kapoor, Adhirath | en_US |
dc.contributor.author | Gupta, Ankur | en_US |
dc.contributor.author | Gupta, Rajesh | en_US |
dc.contributor.author | Tanwar, Sudeep | en_US |
dc.contributor.author | Sharma, Gulshan | en_US |
dc.contributor.author | Davidson, Innocent E. | en_US |
dc.date.accessioned | 2022-01-13T07:24:31Z | - |
dc.date.available | 2022-01-13T07:24:31Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Kapoor, A. et al. 2021. Ransomware detection, avoidance, and mitigation scheme: a review and future directions. Sustainability. 14(1): 8-8. doi:10.3390/su14010008 | en_US |
dc.identifier.issn | 2071-1050 (Online) | - |
dc.identifier.uri | https://hdl.handle.net/10321/3757 | - |
dc.description.abstract | Ransomware attacks have emerged as a major cyber-security threat wherein user data is encrypted upon system infection. Latest Ransomware strands using advanced obfuscation techniques along with offline C2 Server capabilities are hitting Individual users and big corporations alike. This problem has caused business disruption and, of course, financial loss. Since there is no such consolidated framework that can classify, detect and mitigate Ransomware attacks in one go, we are motivated to present Detection Avoidance Mitigation (DAM), a theoretical framework to review and classify techniques, tools, and strategies to detect, avoid and mitigate Ransomware. We have thoroughly investigated different scenarios and compared already existing state of the art review research against ours. The case study of the infamous Djvu Ransomware is incorporated to illustrate the modus-operandi of the latest Ransomware strands, including some suggestions to contain its spread.</jats:p> | en_US |
dc.format.extent | 24 p | en_US |
dc.language.iso | en | en_US |
dc.publisher | MDPI AG | en_US |
dc.relation.ispartof | Sustainability; Vol. 14, Issue 1 | en_US |
dc.subject | 12 Built Environment and Design | en_US |
dc.subject | Ransomware | en_US |
dc.subject | Cryptography | en_US |
dc.subject | WannaCry | en_US |
dc.subject | Djvu | en_US |
dc.subject | Malware | en_US |
dc.subject | Ransomware detection | en_US |
dc.title | Ransomware detection, avoidance, and mitigation scheme : a review and future directions | en_US |
dc.type | Article | en_US |
dc.date.updated | 2021-12-22T09:43:06Z | - |
dc.identifier.doi | 10.3390/su14010008 | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Article | - |
item.languageiso639-1 | en | - |
Appears in Collections: | Research Publications (Engineering and Built Environment) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2021.IEDJP10.sustainability-14-00008.pdf | Published version | 926.99 kB | Adobe PDF | View/Open |
Page view(s)
382
checked on Dec 22, 2024
Download(s)
84
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.