Ransomware-based Cyber Attacks: A Comprehensive Survey

نویسندگان

چکیده

<p>Internet of Things (IoT) and sensor devices have been connected due to the development IoT Information Communication Technology (ICT). It offers automatic environments in smart city scenarios describes investments advanced resources futuristic human lives as sustainable growth quality-wise life with intelligent infrastructure. Nowadays, are continuously increasing utilized applications, including Smart Homes, Farming, Enterprises, others. However, security privacy significant challenges Ransomware-based Cyber-attack detection lack design heterogeneity devices. In last few years, various paradigms technologies mitigate issues Ransomware attack data. This paper comprehensively surveys Cyber Attacks discusses solutions based on such Artificial Intelligence (AI), Blockchain, Software Defined Networks (SDN). Then, we service for ransomware-based cyber-attack detection. Finally, summarize open research future directions ransomware IoT.</p> <p> </p>

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Ransomware: A New Era of Cyber Attack

In today’s world, a most popular crime is Cybercrime. In this paper through a literature study, effect of ransomware is discussed. In this needy internet world, how crucial is to use a non-secure connection and how it will track a normal user or unaware user into the trap of hacker and after that losing money in terms of bit-coins. At last, with the damage cause by the latest attack of ransomwa...

متن کامل

Survey based on Cyber Attacks in Closed Loop Control Systems

In this paper, attacks caused in the shut circle control system is discussed. To keep the net-worked control systems safe, good, ready and hard to move, getting NCS from of the net attacks is very important. The marked power of thought attackers will not move after any made suggestion copies made to scale, they keep on changing their attack designs as if by chance and dynamically. Distributed g...

متن کامل

A Survey on Various Cyber Attacks and their Classification

The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others. Such exploitation of cyberspace for the purpose of accessing unauthorized o...

متن کامل

Comprehensive Solution to Mitigate the Cyber-attacks in Cloud Computing

Cloud computing is a web based utility model. Cybercrimes effecting web based system are equally applicable in the cloud computing. Considering the sensitivity and the damage that can be caused by cybercrimes, this work is an effort to study the various cyber threats and methods to mitigate them. Firstly, it highlights the cloud usage as per the various services model (IaaS, PaaS, and SaaS) and...

متن کامل

Ransomware attacks: detection, prevention and cure

The notion of ransomware has actually been around for quite some time. In 1989, Dr Joseph Popp distributed a trojan called PC Cyborg in which malware would hide all folders and encrypt files on the PC’s C: drive. A script delivered a ransom message demanding that $189 be directed to the PC Cyborg Corporation. The afflicted PC wouldn’t function until the ransom was paid and the malware’s actions...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Internet Technology

سال: 2022

ISSN: ['1607-9264', '2079-4029']

DOI: https://doi.org/10.53106/160792642022122307010