作者
Muhammad Imran Sarwar, Louai A Maghrabi, Kashif Nisar, Imran Khan
发表日期
2023/11/1
期刊
Information Sciences Letters
卷号
12
期号
11
页码范围
2277-2288
出版商
Natural Sciences Publishing
简介
Digital assets are generally regarded as one of the most valuable assets for an organization. When they are captured for ransom purposes, a serious problem arises, and ransomware is responsible for this. When ransomware gets onto a computer or other electronic device, the data on it is encrypted, made inaccessible, or taken away until a ransom is paid. The culprits behind these activities release and disseminate new and sophisticated variants of illicit wealth and notorious practices. Hardware and antivirus software that detect intrusions are not a permanent solution, as hackers can bypass them easily. After ransomware has been executed on an electronic device, it is extremely difficult or nearly impossible to recover the data, and now is the time to draw attention to this threat. In this study, various aspects of ransomware’s propagation, encryption, and mitigation techniques are discussed. We have also used the RanSim simulator to detect malware in a system, and details of the experiment are presented in the later sections. The methodology used for this study can be classified as exploratory research to explore the recent literature on the topic. This study contributes by highlighting recent trends in ransomware, their consequences, and prevention and mitigation techniques.
引用总数
学术搜索中的文章