Research Article | Open Access | Download PDF
Volume 67 | Issue 11 | Year 2019 | Article Id. IJCTT-V67I11P114 | DOI : https://doi.org/10.14445/22312803/IJCTT-V67I11P114
A Study On Approach To Ransomware Detection In Network Security
B.Manivannan, B. Revathi
Citation :
B.Manivannan, B. Revathi, "A Study On Approach To Ransomware Detection In Network Security," International Journal of Computer Trends and Technology (IJCTT), vol. 67, no. 11, pp. 84-88, 2019. Crossref, https://doi.org/10.14445/22312803/IJCTT-V67I11P114
Abstract
Ransomware is considered to be the most perilous malwares mostly used by the networking and cyber criminals in the recent years. This series of malwares uses cryptographic technology that mainly encrypts the significant files and folders of the users’ computer system and make it ineffectual for further use and conceals the decryption key and demand for a ransom from the victims to reinstate the files and folders to it original state. The contemporary Ransomware clans are very refined and challenging to scrutinise and detect using immobile features. Most likely the latest crytoransomwares in network security having sandboxing and IDS dodging capabilities which ensures a threat permanently. It is quite ardent that the static and dynamic analysis methods alone cannot provide the apt and fitting solution for the Ransomware in network security. In this article, we present a Machine Learning based approach with an assimilated method, a mixture of static and dynamic analysis to detect the ransomeware in network security. The experimental test samples were taken from different network security Ransomware based families. The results proposes that collective analysis can perceive ransomeware with improved accuracy when compared to individual approach for both static and dynamic.
Keywords
Ransomware, Crypto-ransomewares, Network Security, Static Analysis, Dynamic AnalysisReferences
[1] Engeldinger, E.A. (1998). Technology Infrastructure and Information Literacy. Library Philosophy and Practice, 1:1.
[2] TaylornS.E., Sherman D.K., Kim H.S., Jarcho J., Takagi K. & Dungan M.S. (2004). Culture and social support: who seeks it and why?. J Pers Soc Psychol. 2004 Sep;87(3):354- 62.
[3] Attwell, J. (2005). Mobile Technologies and Learning. Learning and skills development agency.Uk.State University of New York press.
[4] Haywood, D. (2003). Confidence, Experience and Attitudes of Undergraduates students towards ICT.
[5] B-HERT (2002). Enhancing the Learning and Employability of Graduates: The role of generic skill.position paper no.9, Business Education Roundtable, HREF. Retrieved from http://www.bhert.com/publicationpolicystatements.html.
[6] Martins,A. (2006). Literacies for the digital age. In A Martin &D.Madign (Eds.), Digital Literacies for learning, London: facet publishing, p. 3-25.
[7] Ayeh, J.K. (2008). Information Technology and Global Education: the challenges of the African Virtual University Learning CentresIn Ghana. Information Development Journal. Retrieved fromhttp://idv.sagepub.com/cgi/content/abstract/24/4/266.
[8] Leiner, B.M. (2000). “A brief history of internet,” retrieved from http://www.isoc.org/internet/history/brief.shtml.pdf.
[9] Eshet-Alkalai, Y. (2004). Digital Literacy: A Conceptual Framework for Survival Skill in the digital Era. Journal of Educational Multimedia and Hypermedia, 1391, 93-106. Retrieved from http://www.openu.ac.il/personal_sites/download/Digital_Lit eracy 2004-JEMH.pdf