Abstract

Ransomware is the challenging threat it will stop the user from their activity so the user can’t access the data of the system. Ransomware is the challenging threat it will stop the user to do their activity. When a ransomware is injected to a system all the utility files and the system files will be encrypted where the user cannot work with and access with the system data. To prevent the ransom attack we need to implement the honey pot techniques. The honey pot is the trap for the attacker it will capture everything that enters into the system. If the packet that enters into the system is by some anonymous user and if the user attacks the system, we can use this honey pot to trap the packet. When there is a ransom ware attack, the malware usually tries to encrypt the data. An honey pot is set to find if any data are encrypted in the system. If the honey pot finds any data is been encrypted then notifies and if the honey pot fines the encryption is started by malicious activity, then it will cut the network connectivity of the system from the network. In this paper we have analysed different honey pot techniques. further we are going to create s-honey pot to get prevent the attack from the ransomware.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.