Skip to Content

19 Results Found

  • Article
  • Open Access
98 Citations
12,785 Views
15 Pages

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

  • S. H. Kok,
  • Azween Abdullah,
  • NZ Jhanjhi and
  • Mahadevan Supramaniam

1 November 2019

Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it ma...

  • Systematic Review
  • Open Access
23 Citations
14,249 Views
39 Pages

Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges

  • José Antonio Gómez Hernández,
  • Pedro García Teodoro,
  • Roberto Magán Carrión and
  • Rafael Rodríguez Gómez

1 November 2023

According to the premise that the first step to try to solve a problem is to deepen our knowledge of it as much as possible, this work is mainly aimed at diving into and understanding crypto-ransomware, a very present and true-world digital pandemic,...

  • Article
  • Open Access
7 Citations
2,927 Views
20 Pages

23 April 2024

Given the high relevance and impact of ransomware in companies, organizations, and individuals around the world, coupled with the widespread adoption of mobile and IoT-related devices for both personal and professional use, the development of effecti...

  • Article
  • Open Access
3,051 Views
25 Pages

Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker

  • Xiang Fang,
  • Eric Song,
  • Cheng Ning,
  • Huseyn Huseynov and
  • Tarek Saadawi

10 June 2025

Ransomware is a group of malware that aims to make computing resources unavailable, demanding a ransom amount to return control back to users. Ransomware can be classified into two types: crypto-ransomware and locker ransomware. Crypto-ransomware emp...

  • Systematic Review
  • Open Access
92 Citations
15,160 Views
19 Pages

25 February 2022

Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems. Due to its unique characteristics, ransomware has attracted the att...

  • Article
  • Open Access
9 Citations
2,643 Views
14 Pages

28 April 2023

Ransomware is a type of malware that employs encryption to target user files, rendering them inaccessible without a decryption key. To combat ransomware, researchers have developed early detection models that seek to identify threats before encryptio...

  • Article
  • Open Access
22 Citations
6,652 Views
24 Pages

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

  • Simon R. Davies,
  • Richard Macfarlane and
  • William J. Buchanan

21 October 2022

Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by...

  • Article
  • Open Access
22 Citations
4,426 Views
23 Pages

4 May 2020

Desktop and portable platform-based information systems become the most tempting target of crypto and locker ransomware attacks during the last decades. Hence, researchers have developed anti-ransomware tools to assist the Windows platform at thwarti...

  • Article
  • Open Access
24 Citations
5,319 Views
20 Pages

16 March 2022

Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for de...

  • Article
  • Open Access
7 Citations
1,804 Views
17 Pages

7 March 2024

Early detection of ransomware attacks is critical for minimizing the potential damage caused by these malicious attacks. Feature selection plays a significant role in the development of an efficient and accurate ransomware early detection model. In t...

  • Article
  • Open Access
17 Citations
3,658 Views
16 Pages

Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors

  • Hyunji Kim,
  • Jaehoon Park,
  • Hyeokdong Kwon,
  • Kyoungbae Jang and
  • Hwajeong Seo

24 March 2021

A crypto-ransomware has the process to encrypt victim’s files. Afterward, the crypto-ransomware requests a ransom for the password of encrypted files to victims. In this paper, we present a novel approach to prevent crypto-ransomware by detecting blo...

  • Article
  • Open Access
36 Citations
4,484 Views
15 Pages

A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT

  • Yahye Abukar Ahmed,
  • Shamsul Huda,
  • Bander Ali Saleh Al-rimy,
  • Nouf Alharbi,
  • Faisal Saeed,
  • Fuad A. Ghaleb and
  • Ismail Mohamed Ali

21 January 2022

Ransomware attacks against Industrial Internet of Things (IIoT) have catastrophic consequences not only to the targeted infrastructure, but also the services provided to the public. By encrypting the operational data, the ransomware attacks can disru...

  • Article
  • Open Access
12 Citations
9,546 Views
15 Pages

10 September 2018

Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures...

  • Article
  • Open Access
20 Citations
13,451 Views
26 Pages

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

  • Grant McDonald,
  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • Jawad Ahmad and
  • William J. Buchanan

26 January 2022

Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to...

  • Article
  • Open Access
1 Citations
4,835 Views
17 Pages

22 April 2024

The ever-evolving landscape of cyber threats, with ransomware at its forefront, poses significant challenges to the digital world. Windows 11 Pro, Microsoft’s latest operating system, claims to offer enhanced security features designed to tackl...

  • Article
  • Open Access
5 Citations
2,981 Views
17 Pages

Adaptive Ransomware Detection Using Similarity-Preserving Hashing

  • Anas AlMajali,
  • Adham Elmosalamy,
  • Omar Safwat and
  • Hassan Abouelela

19 October 2024

Crypto-ransomware is a type of ransomware that encrypts the victim’s files and demands a ransom to return the files. This type of attack has been on the rise in recent years, as it offers a lucrative business model for threat actors. Research into de...

  • Article
  • Open Access
17 Citations
5,479 Views
23 Pages

19 November 2021

Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to...

  • Review
  • Open Access
90 Citations
16,539 Views
54 Pages

15 December 2020

This survey investigates the contributions of research into the detection of ransomware malware using machine learning and deep learning algorithms. The main motivations for this study are the destructive nature of ransomware, the difficulty of rever...

  • Article
  • Open Access
1,450 Views
21 Pages

In today’s era of technology, where information is readily available anytime and from anywhere, safeguarding our privacy and sensitive data is more important than ever. The thermal sensors embedded within a CPU are primarily utilized for monito...