Cryptoviral Extortion: A virus based approach

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - May Issue 2013 by IJCTT Journal
Volume-4 Issue-5                           
Year of Publication : 2013
Authors :S.Manoj Kumar, M.Ravi Kumar

MLA

S.Manoj Kumar, M.Ravi Kumar"Cryptoviral Extortion: A virus based approach "International Journal of Computer Trends and Technology (IJCTT),V4(5):1149-1153 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - As we know that traditionally, "Cryptography" is used for information processing and communications, it helps people to store information securely and it is used very frequently for private communications. but Cryptovirology is the study of applications of cryptography to build the malicious software (malware). It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and improve new malware attacks. This is a forward engineering discipline that can be used for attacking rather than defending. In this paper we present the clear process of “how the crypto virus can damage the victim’s system, based on Extortion mechanism” with showing the live scenario that causes the loss of access to information, loss of control and loss of money also. Here we discuss and explain some of the latest events regarding to this cryproviral extortion like GPcode and Conflicker. This paper also suggests some of the countermeasures, mechanisms to defend and prevent such attacks. Even if the attacker’s actions on the host machine are being monitored, it cannot be controlled the host system completely. By knowing that the exact scenario what exactly hacker follow to spoil our system or network using this cryptoviral Extortion method .we can anticipate or guesses the opponent's or attackers next move and can able to provide some of the safe guards initially.

 

References-
[1] “Malicious Cryptography Exposing Cryptovirology” by Adam Young Moti Yung , Wiley Publishing, Inc.
[2] http://en.wikipedia.org
[3] Shafiqul Abidin, Rajeev Kumar, Varun Tiwari,” A Review Report on Cryptovirology and Cryptography” International Journal of Scientific & Engineering Research, Volume 3, Issue 11, November-2012 1 ISSN 2229-5518
[4] Adam Young and Moti Yung, Cryptovirology: Extortion-Based Security Threat and Countermeasures, Proceedings of the 1996 IEEE Symposium on Security and Privacy.
[5] Cryptovirology.com FAQ: http://www.cryptovirology.com/
[6] Shivale Saurabh Anandrao,” Cryptovirology: Virus Approach” International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
[7] http://www.viruslist.com/en/viruses/encyclopedia?virus id=313 444

Keywords — —cryptovirus, snatching, public-key cryptography, kleptography, cryptanalysis, Gpcode, Malware, Deniable Password Snatching (DPS), cryptoviral extortion.