The rise of ransomware: a review of attacks, detection techniques, and future challenges
Cybersecurity is important in the field of information technology. One most recent pressing issue is information security. When we think of cybersecurity, the first thing that comes to mind is cyber-attacks, which are on the rise, such as Ransomware. Various governments and businesses take a variety...
| Main Authors: | Kamil, Samar, Siti Norul Huda, Sheikh Abdullah, Ahmad Firdaus, Zainal Abidin, Usman, Opeyemi Lateef |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/39464/ http://umpir.ump.edu.my/id/eprint/39464/1/The%20Rise%20of%20Ransomware_A%20Review%20of%20Attacks%2C%20Detection%20Techniques.pdf http://umpir.ump.edu.my/id/eprint/39464/2/The%20rise%20of%20ransomware_a%20review%20of%20attacks%2C%20detection%20techniques%2C%20and%20future%20challenges_ABS.pdf |
Similar Items
Ransomware: stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
A Short Review for Ransomware: Pros and Cons
by: Shakir, Hasan Awni, et al.
Published: (2018)
by: Shakir, Hasan Awni, et al.
Published: (2018)
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
Report of job done on preventing ransomware virus attack to PC
by: Mustafa, mohd mizam, et al.
Published: (2017)
by: Mustafa, mohd mizam, et al.
Published: (2017)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)
by: Laouratou, Diallo, et al.
Published: (2017)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Predicting the success of suicide terrorist attacks using different machine learning algorithms
by: Hossain, Md Junayed, et al.
Published: (2022)
by: Hossain, Md Junayed, et al.
Published: (2022)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Future behavioural of console gamers and mobile gamers : Are they differ?
by: Syahrulanuar, Ngah, et al.
Published: (2024)
by: Syahrulanuar, Ngah, et al.
Published: (2024)
A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
by: Alfagi, Abdalrahman, et al.
Published: (2017)
by: Alfagi, Abdalrahman, et al.
Published: (2017)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Processing skyline queries in incomplete database: issues,
challenges and future trends
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
by: Muhammad, Ayaz, et al.
Published: (2009)
by: Muhammad, Ayaz, et al.
Published: (2009)
Utilizing first hop redundancy protocol to mitigate the effects of denial-of-service attack
by: Khong, Johnson
Published: (2018)
by: Khong, Johnson
Published: (2018)
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
"Challenges and future in deep learning for sentiment analysis: a comprehensive review and a proposed novel hybrid approach"
by: Islam, Md Shofiqul, et al.
Published: (2024)
by: Islam, Md Shofiqul, et al.
Published: (2024)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Similar Items
-
Ransomware: stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022) -
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021) -
A Short Review for Ransomware: Pros and Cons
by: Shakir, Hasan Awni, et al.
Published: (2018) -
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022) -
Report of job done on preventing ransomware virus attack to PC
by: Mustafa, mohd mizam, et al.
Published: (2017)