Ransomware: stages, detection and evasion

Ransomware attacks has been increasing lately with companies suffer monetarily, wasted business opportunity and wasted time. Big companies are now targeted as they are more profitable for ransomware threat actor. This paper discuses on stages of ransomware attacks starting from reconnaissance to ext...

Full description

Saved in:
Bibliographic Details
Main Authors: Yus Kamalrul, Mohamed Yunus, Syahrulanuar, Ngah
Format: Conference or Workshop Item
Language:English
Published: IEEE 2022
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/35865/7/MCN19001%20Ransomware%20stages%2C%20detection%20and%20evation.submitted.pdf
http://umpir.ump.edu.my/id/eprint/35865/
https://doi.org/10.1109/ICSECS52883.2021.00048
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
id my.ump.umpir.35865
record_format eprints
spelling my.ump.umpir.358652022-12-12T02:14:39Z http://umpir.ump.edu.my/id/eprint/35865/ Ransomware: stages, detection and evasion Yus Kamalrul, Mohamed Yunus Syahrulanuar, Ngah QA75 Electronic computers. Computer science Ransomware attacks has been increasing lately with companies suffer monetarily, wasted business opportunity and wasted time. Big companies are now targeted as they are more profitable for ransomware threat actor. This paper discuses on stages of ransomware attacks starting from reconnaissance to extortion. It also discusses on steps that organization should take to prevent ransomware attack and several detection methods for ransomware. Other than that, it lists anti-analysis and evasion method used by ransomware to evade detections. Lastly, it discusses the latest ransomware attacks. IEEE 2022 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/35865/7/MCN19001%20Ransomware%20stages%2C%20detection%20and%20evation.submitted.pdf Yus Kamalrul, Mohamed Yunus and Syahrulanuar, Ngah (2022) Ransomware: stages, detection and evasion. In: 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), 24-26 August 2021 , Pekan, Pahang, Malaysia. pp. 227-231.. ISBN 978-1-6654-1407-4 https://doi.org/10.1109/ICSECS52883.2021.00048
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Yus Kamalrul, Mohamed Yunus
Syahrulanuar, Ngah
Ransomware: stages, detection and evasion
description Ransomware attacks has been increasing lately with companies suffer monetarily, wasted business opportunity and wasted time. Big companies are now targeted as they are more profitable for ransomware threat actor. This paper discuses on stages of ransomware attacks starting from reconnaissance to extortion. It also discusses on steps that organization should take to prevent ransomware attack and several detection methods for ransomware. Other than that, it lists anti-analysis and evasion method used by ransomware to evade detections. Lastly, it discusses the latest ransomware attacks.
format Conference or Workshop Item
author Yus Kamalrul, Mohamed Yunus
Syahrulanuar, Ngah
author_facet Yus Kamalrul, Mohamed Yunus
Syahrulanuar, Ngah
author_sort Yus Kamalrul, Mohamed Yunus
title Ransomware: stages, detection and evasion
title_short Ransomware: stages, detection and evasion
title_full Ransomware: stages, detection and evasion
title_fullStr Ransomware: stages, detection and evasion
title_full_unstemmed Ransomware: stages, detection and evasion
title_sort ransomware: stages, detection and evasion
publisher IEEE
publishDate 2022
url http://umpir.ump.edu.my/id/eprint/35865/7/MCN19001%20Ransomware%20stages%2C%20detection%20and%20evation.submitted.pdf
http://umpir.ump.edu.my/id/eprint/35865/
https://doi.org/10.1109/ICSECS52883.2021.00048
_version_ 1752146614791700480