Introduction of the ARDS-Anti-Ransomware Defense System Model-Based on the Systematic Review of Worldwide Ransomware Attacks

被引:7
作者
Szucs, Veronika [1 ]
Aranyi, Gabor [1 ]
David, Akos [1 ]
机构
[1] Univ Pannonia, Dept Elect Engn & Informat Syst, Egyet St 10, H-8200 Veszprem, Hungary
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 13期
关键词
cybersecurity; ransomware; autonomous ARDS model; INTRUSION DETECTION;
D O I
10.3390/app11136070
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
We live in a world of digital information communication and digital data storage. Following the development of technology, demands from the user side also pose serious challenges for developers, both in the field of hardware and software development. However, the increasing penetration of the Internet, IoT and digital solutions that have become available in almost every segment of life, carries risks as well as benefits. In this study, the authors present the phenomenon of ransomware attacks that appear on a daily basis, which endangers the operation and security of the digital sphere of both small and large enterprises and individuals. An overview of ransomware attacks, the tendency and characteristics of the attacks, which have caused serious financial loss and other damages to the victims, are presented. This manuscript also provides a brief overview of protection against ransomware attacks and the software and hardware options that enhance general user security and their effectiveness as standalone applications. The authors present the results of the study, which aimed to explore how the available software and hardware devices can implement digital user security. Based on the results of the research, the authors propose a complex system that can be used to increase the efficiency of network protection and OS protection tools already available to improve network security, and to detect ransomware attacks early. As a result, the model of the proposed protection system is presented, and it can be stated that the complex system should be able to detect ransomware attacks from either the Internet or the internal network at an early stage, mitigate malicious processes and maintain data in recoverable state.
引用
收藏
页数:23
相关论文
共 28 条
[1]  
Abrams L., COMPUTER GIANT ACER
[2]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[3]  
Alomary FO, 2020, INT J COMPUT SCI NET, V20, P11
[4]   Detection of Malicious Servers for Preventing Client-Side Attacks [J].
Bux, Khuda ;
Yousaf, Muhammad ;
Jalbani, Akhtar Hussain ;
Batool, Komal .
MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (01) :230-240
[5]   Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics [J].
Cabaj, Krzysztof ;
Gregorczyk, Marcin ;
Mazurczyk, Wojciech .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 :353-368
[6]   Dynamic Distributed Secure Storage Against Ransomware [J].
Castiglione, Jason ;
Pavlovic, Dusko .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (06) :1469-1475
[7]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[8]  
Clark D., NUMBER SMALL MEDIUM
[9]  
CoincashEU, BITC YEARL RAT BITC YEARL RAT
[10]   Protecting your organization from e-mail phishing and ransomware attacks [J].
Croke, Lisa .
AORN JOURNAL, 2020, 112 (04) :P10-P12