Defend Against Ransomware Detection Using Intrusion Detection System (IDS)

被引:0
作者
Alomary, Fahad Omar [1 ]
机构
[1] Al Imam Mohammad Ibn Saud Islamic Univ, Coll Comp & Informat Sci, Informat Technol Dept, Riyadh, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2020年 / 20卷 / 07期
关键词
Ransomware; Intrusion Detection System; Intrusion Prevention System; SNORT and WannaCry;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware is currently one of the most impactful forms of cyber-attacks available. One of the greatest challenges posed by ransom ware is the extremely large number and diversity of ransom ware families, and the fact that new ransom ware variants are being released by cybercriminals on a regular basis. In this paper, studied different ransom ware families, and identified several distinctive characteristics and attributes that could be used in early detection of ransom ware based on network traffic analysis. Intrusion Detection System (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations. Institution network is a complex infrastructure consisting of multiple virtual local area networks "VLANs" separating the different departments, laboratories and facilities according to their functions. Institution Network border consists of a firewall which oversees the ingoing and outgoing traffic and also has a manual monitoring system which logs intrusion attempts. To perform any action against an intrusion the administrator has to perform any action manually. The aim of this paper is to provide an intrusion detection system to be deployed on the Institution Network infrastructure. The IDS will be in the form of an Agent which is located on the network's border acting as the second line of defense behind the firewall, the agent will analyze network traffic by comparing the behavior with a database containing certain measures hence classifying the user.
引用
收藏
页码:11 / 16
页数:6
相关论文
共 12 条
  • [1] Alelyani S., 2018, Overview of cyberattack on saudi organizations
  • [2] Improving network intrusion detection system performance through quality of service configuration and parallel technology
    Bul'ajoul, Waleed
    James, Anne
    Pannu, Mandeep
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (06) : 981 - 999
  • [3] Caliaberah Prya Booshan, 2020, Advances in Information and Communication. Proceedings of the 2020 Future of Information and Communication Conference (FICC). Advances in Intelligent Systems and Computing (AISC 1129), P618, DOI 10.1007/978-3-030-39445-5_45
  • [4] Formby D., 2019, RSA C
  • [5] Gagneja K.K., 2017, 2017 Third International Conference on Mobile and Secure Services, P1
  • [6] Kao DY, 2018, INT CONF ADV COMMUN, P159, DOI 10.23919/ICACT.2018.8323682
  • [7] The real security issues of the iPhone case Law enforcement needs 21st-century investigative savvy
    Landau, Susan
    [J]. SCIENCE, 2016, 352 (6292) : 1398 - 1399
  • [8] Mohurle S, 2017, INT J ADV RE, V8
  • [9] An intrusion detection and prevention system in cloud computing: A systematic review
    Patel, Ahmed
    Taghavi, Mona
    Bakhtiyari, Kaveh
    Celestino Junior, Joaquim
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 25 - 41
  • [10] Richardson R., 2017, International Management Review, V13, P10