Retaliation against Ransomware in Cloud-Enabled PureOS System

نویسندگان

چکیده

Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades. There are numerous variations ransomware, each which can encrypt either the entire computer system or specific files. Malicious needs infiltrate a it do any real damage. Manually inspecting all potentially file types time-consuming resource-intensive requirement conventional security software. Using established metrics, this research delves into complex issues identifying preventing ransomware. On basis real-world malware samples, we created parameterized categorization strategy for functional classes suggestive features. We also furnished set criteria highlights most commonly featured investigated both behavior insights. used distinct operating cloud platform facilitate remote access collaboration on files throughout operational experimental infrastructure. With help our proposed detection mechanism, were able effectively recognize prevent state-of-art modified anomalies. Aggregated log revealed consistent satisfactory rate at 89%. To best knowledge, no exists has impact PureOS, offers unique PC, mobile phones, resource intensive IoT (Internet Things) devices.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware

Ransomware becomes more and more threatening nowadays. In this paper, we propose CLDSafe, a novel and efficient file backup system against ransomware. It keeps shadow copies of files and provides secure restoration using cloud storage when a computer is infected by ransomware. After our system measures file similarities between a new file on the client and an old file on the server, the old fil...

متن کامل

Retaliation Against Protocol Attacks

Security protocols intend to give their parties reasonable assurance that certain security properties will protect their communication session. However, the literature confirms that the protocols may suffer subtle and hidden attacks. Flawed protocols are customarily sent back to the design process, but the costs of reengineering a deployed protocol may be prohibitive. This paper outlines the co...

متن کامل

Cloud manufacturing system

Cloud manufacturing is defined as a relationship between the consumer and a flexible array of production services, managed by an intervening architecture that can match service providers to product and manufacturing processes Cloud manufacturing definitions typically make explicit or imply three groups of actors: consumers, who request and use cloud manufacturing processes; application provider...

متن کامل

Redemption: Real-Time Protection Against Ransomware at End-Hosts

Ransomware is a form of extortion-based attack that locks the victim’s digital resources and requests money to release them. The recent resurgence of high-profile ransomware attacks, particularly in critical sectors such as the health care industry, has highlighted the pressing need for effective defenses. While users are always advised to have a reliable backup strategy, the growing number of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2023

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math11010249