A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks

Rehman, M. and Akbar, R. and Omar, M. and Gilal, A.R. (2024) A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks. Communications in Computer and Information Science, 2001 C. pp. 80-95.

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

In today's world, cybersecurity is critical in the field of information technology. With the rise of cyber-attacks, including ransomware attacks, protecting user data has become a top priority. Despite the various strategies employed by governments and companies to counteract cybercrime, ransomware continues to be a major concern. Therefore, there is a need to detect and obfuscate viruses in a better way. This immutable impact on the target is what recognizes ransomware attacks from traditional malware. Ransomware attacks are expected to become more problematic in the future. Attackers might use new encryption methods or obfuscation techniques to make ransomware detection and analysis a difficult job. To protect against such attacks, organizations and users employ various tools, guidelines, security guards, and best practices. However, despite these efforts, cyber-attacks have increased exponentially in recent years. Among the most devastating of these attacks is ransomware, which can encrypt user files or lock their devices� interfaces, rendering them unusable. This research paper provides a valuable resource for researchers, practitioners, and policymakers seeking to enhance their understanding of ransomware detection and mitigation. It also examines defense tactics, such as system backups and network breakdowns, which can help mitigate the impact of an attack. Finally, the paper considers upcoming challenges in the field of cybersecurity and the importance of staying vigilant in protecting against cyber threats. © 2024, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Item Type: Article
Additional Information: cited By 0; Conference of 9th International Conference on Computing and Informatics, ICOCI 2023 ; Conference Date: 13 September 2023 Through 14 September 2023; Conference Code:307589
Uncontrolled Keywords: Computer viruses; Crime; Data obfuscation; Network security; Viruses, Cyber security; Cyber-attacks; Cyber-crimes; Detection methods; Detection tools; Potential attack; Ransomware detection; Ransomware mitigation; Systematic literature review; User data, Cybersecurity
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 04 Jun 2024 14:19
Last Modified: 04 Jun 2024 14:19
URI: https://khub.utp.edu.my/scholars/id/eprint/20170

Actions (login required)

View Item
View Item