Abstract

The growth of ICT within the society has become increasingly digitized, thus, the overall activity has amounted to various researches for protecting any data from malicious threats. Recently, ransomware has been a rapidly propagated subject for social engineering techniques especially the ransomware. Users can delete a ransomeware code using an antivirus software code. However, the encrypted data would be impossible to recover. Therefore, ransomware must be prevented and must have early detection before it infects any data. In this paper, we are proposing a quantification model to prevent and detect any cryptographic operations in the local drive.

Highlights

  • IntroductionWith the progress of digital society, the traditional society’s activity has been closely related to cyberspace the growth of ubiquitous technology

  • With the progress of digital society, the traditional society’s activity has been closely related to cyberspace the growth of ubiquitous technology.Most of Society activity on cyberspace protecting data from malicious threats as being society has become increasingly digital [1].Malicious codes are the major threat of cyber-attacks, the malicious programs are installed without users agreement at same time break user system’s protection to control user system secretly [2].The initial malicious codes are virus-typed to destroy systems

  • We provided a quantification model based on hash algorithm to against social engineering based malicious attacks

Read more

Summary

Introduction

With the progress of digital society, the traditional society’s activity has been closely related to cyberspace the growth of ubiquitous technology. With the risk increase of malicious code, the anti-malware’s design and develop are necessary It is Traditional software engineering techniques and social engineering has been applied to target against attacks such as APT (Advanced Persistent Threat) [3]. Ransomware is recent top issue, employs social engineering techniques that are used to trigger users curiosity and induce users to make approach. Such malware emerges as a more powerful threat [4]. In this paper we provide a techniques for detect ransomware with social engineering, in this design include a quantitative model, which can be use to detecting. If the infected computer or file to ransomware, and it is not be repaired (Figure 1)

File-Based Intrusion Detection Method
IP Trace Back Algorithm
Quantification Model for Ramsomware Prevent
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.