Abstract

Ransomware attacks have been increasingly concerning in times. The situation is only getting worse. They have shed light on a category of software that demands a ransom, for releasing a hostage asset. The majority of ransomware strains rely on encrypting data. Essentially, they lock up files on the victims’ devices and network drives before demanding payment to decrypt them. In this study, we first introduce a classification system for ransomware. Then drawing from this taxonomy and identifying a present in highly resilient ransomware during the key exchange process we propose an innovative method for detecting and thwarting these resilient strains to prevent them from encrypting victims’ data. Through testing our model shows promising results, in identifying variations of dangerous ransomware strains.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call