A malicious activity monitoring mechanism to detect and prevent ransomware

In this digital world, security is the primary concern for users concerned about unauthorised access to their computer systems. At the same time, ransomware – a tool used by cyber criminals to encrypt the contents of a computer's file system without the permission or knowledge of the victim – is becoming increasingly common. Once the system is compromised – that is, the files are encrypted – the attacker forces users to pay a ransom, typically through online payment methods, to get a decryption key. Even if victims pay the ransom, there is no guarantee that the decryption key will be supplied, or access to their computer system restored.

[1]  Engin Kirda,et al.  UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.

[2]  Ross Brewer,et al.  Ransomware attacks: detection, prevention and cure , 2016, Netw. Secur..

[3]  Stefano Zanero,et al.  HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.

[4]  Steve Mansfield-Devine,et al.  : taking , 2016 .

[5]  Cath Everett,et al.  Ransomware: to pay or not to pay? , 2016 .

[6]  Patrick Traynor,et al.  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[7]  Leyla Bilge,et al.  Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.

[8]  Rik Farrow,et al.  Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace , 2000 .

[9]  Xin Luo,et al.  Awareness Education as the Key to Ransomware Prevention , 2007, Inf. Secur. J. A Glob. Perspect..

[10]  Manisha Patil,et al.  A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .

[11]  Pavol Zavarsky,et al.  Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization , 2016, FNC/MobiSPC.

[12]  Antonella Santone,et al.  Ransomware Inside Out , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[13]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[14]  M. North,et al.  Ransomware: Evolution, Mitigation and Prevention , 2017 .