Altmetrics
Downloads
473
Views
106
Comments
0
A peer-reviewed article of this preprint also exists.
This version is not peer-reviewed
Submitted:
22 May 2023
Posted:
23 May 2023
You are already at the latest version
References | Year | Name of the ransomware | Description |
---|---|---|---|
[4] | 1989 | AIDS Trojan | The first known ransomware attack, the AIDS Trojan, was distributed on floppy disks and demanded a payment of $ 189 to unlock infected files. |
[5] | 2012 | Reveton | ransomware that posed as law enforcement and demanded payment for supposed illegal activities. |
[7] | 2013 | CryptoLocker | one of the first widespread ransomware attacks that used encryption to lock victims’ files. |
[8] | 2014 | CryptoWall | A variant of CryptoLocker that caused millions of dollars in damages. |
[3] | 2015 | TeslaCrypt | A ransomware strain that targeted gamers and encrypted game-related files. |
[9] | 2016 | Locky | Ransomware that was spread through malicious email attachments. |
[3] | 2017 | WannaCry | A ransomware attack affecting over 200,000 systems across 150 different countries. |
[10] | 2018 | SamSam | A ransomware attack that targeted hospitals, municipalities, and other organizations. |
[3] | 2019 | Ryuk | A ransomware attack that caused significant damage to several companies and organizations. |
[11] | 2020 | Maze | A ransomware attack that encrypted victims’ files and threatened to leak sensitive data if the ransom was not paid. |
[3] | 2021 | REvil/Sodinokibi | A ransomware attack that targeted Kaseya, a software company, and affected over 1,500 businesses worldwide. |
[12] | 2022 | Royal Ransomware | A ransomware attack that encrypted victims and demands a ransom payment in order to decrypt them, targets businesses, governments, and healthcare organizations, and the victims are mostly from the United States. |
[12] | 2023 | LockBit Ransomware | A ransomware attack that encrypts the files and demands payment in exchange for the decryption key. often in conjunction with phishing emails or other social engineering techniques. |
References | Algorithms | Characteristics |
---|---|---|
[23,24] | Decision trees | Decision trees can be trained on features such as file modifications, network traffic, and system calls to distinguish between ransomware and benign software behavior. The decision tree that results can then be used to determine whether new data contains ransomware. |
[23,24] | Random forests | In order to guarantee that each tree in the forest has the same distribution and is dependent on the values of a randomly selected random vector, this strategy uses an ensembled method that combines tree predictors.Performance may be enhanced in comparison to standalone decision trees.Using a network of decision trees, the random forest approach is used to select and forecast the input data type. |
[25,26] | Support vector machines | Support vector machines can be trained on features such as system calls, network traffic, and file behavior to distinguish between ransomware and benign software behavior. After that, it is possible to determine whether new data constitutes ransomware using the resultant Support vector machines. Support vector machines are handy when the data is high-dimensional and non-linearly separable, often in ransomware detection. |
[27,28] | Neural networks | Like a biological brain, neural networks can find patterns in vast amounts of data. After getting the raw input, multi-layer neural network algorithms performed internal operations to extract and choose features. They have a mechanism for feature extraction and selection as a result. An input layer, an output layer holding the categorized variables, and a hidden layer comprise a primary neural network. The layers create an interconnected network of neurons. |
References | Year | Author | Resolved the Issue | Utilized Technique | Result | Limitation |
---|---|---|---|---|---|---|
[32] | 2017 | Zahra & Sha | Detecting a ransomware attack using Cryptowall | Blocklisting of command and control (C and C) servers | The web proxy server, which acts as the TCP/IP traffic gateway, extracts the TCP/IP header. | The model’s efficacy and precision in identifying ransomware and its attack techniques against various operating system environments were not demonstrated through implementation. |
[33] | 2018 | Shaukat & Ribeiro | detection of ransomware | (RansomWall) A layered and hybrid mechanism | effective at identifying zero-day attacks | N/A |
[34] | 2019 | Makinde et al. | To determine whether an actual network system is vulnerable to a ransomware assault | Learning Machines | Correlation greater than 0.8 | It imitated the behavior of a small group of users. |
[35] | 2019 | Ahmad et al. | Differentiating Locky ransomware users | Utilizing parallel classifiers, a behavioral approach to ransomware detection | Highly reliable detection with a low proportion of false positives | N/A |
[36] | 2022 | Singh et al. | Discovery of new ransomware families and classification of newly discovered ransomware assaults | Checks process memory access privileges to enable rapid and accurate malware detection | Between 81.38% and 96.28% accuracy. | N/A |
References | Year | Author | Problem Addressed | Method Used | Result |
---|---|---|---|---|---|
[25] | 2017 | Rahman and Hasan | Enhanced ransomware detection method | Using support vector machines as an analysis tool | Better ransomware detection is achieved with an integrated approach than static or dynamic analysis used separately. |
[21] | 2018 | Dehghantanha et al. | Windows ransomware detection that is quick and accurate | Netconverse (classifier using j48 decision tree) | 97.1% actual positive detection rate |
[38] | 2019 | Jasmin | Separating ransomware traffic and regular traffic | Algorithms used in logistic regression include random forest and support vector machine. | The best detection rate is 99.9% for the random forest, with 0% false positives. |
[39] | 2019 | Ameer | Detection of ransomware. | Analyses that are static and dynamic. | 100% detection and classification precision |
[24] | 2020 | Khammas | Detection of ransomware. | Random forest method. | 97.74% of samples are detected. |
[29] | 2020 | Hwang et al. | An improved method of detecting ransomware. | Random forest and Markov models | 97.3% overall accuracy, 4.8% for false positives, and 1.5% for false negatives. |
[40] | 2022 | Talabani and Abdulhadi | Tools for detecting ransomware that involves data mining and machine learning approaches have poor accuracy. | Decision Table and PARTially Decided Decision Tree. | Recall (96%), accuracy (96.01%), F-measure (95.6%), and precision (95.9%) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated