Analysis of Ransomware Attacks in Windows Operating System Using the Approach of Memory Analysis
Abstract
Keywords
Full Text:
PDFArticle Metrics :
References
D. Y. Huang et al., “Tracking Ransomware End-to-end,” in 2018 IEEE Symposium on Security and Privacy (SP), IEEE, May 2018, pp. 618–631. doi: 10.1109/SP.2018.00047.
B. A. Khalaf et al., “An Adaptive Protection of Flooding Attacks Model for Complex Network Environments,” Security and Communication Networks, vol. 2021, pp. 1–17, Apr. 2021, doi: 10.1155/2021/5542919.
Z. K. Maseer, R. Yusof, S. A. Mostafa, N. Bahaman, O. Musa, and B. Ali Saleh Al-rimy, “DeepIoT.IDS: Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection,” Computers, Materials & Continua, vol. 69, no. 3, pp. 3945–3966, 2021, doi: 10.32604/cmc.2021.016074.
A. Tandon and A. Nayyar, “A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat,” in Advances in Intelligent Systems and Computing, vol. 839, Springer Verlag, 2019, pp. 403–420. doi: 10.1007/978-981-13-1274-8_31.
J. Hwang, J. Kim, S. Lee, and K. Kim, “Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques,” Wirel Pers Commun, vol. 112, no. 4, pp. 2597–2609, Jun. 2020, doi: 10.1007/s11277-020-07166-9.
A. Zimba and M. Chishimba, “On the Economic Impact of Crypto-ransomware Attacks: The State of the Art on Enterprise Systems,” European Journal for Security Research, vol. 4, no. 1, pp. 3–31, Apr. 2019, doi: 10.1007/s41125-019-00039-8.
I. A. Chesti, M. Humayun, N. U. Sama, and N. Z. Jhanjhi, “Evolution, Mitigation, and Prevention of Ransomware,” in 2020 2nd International Conference on Computer and Information Sciences, ICCIS 2020, Institute of Electrical and Electronics Engineers Inc., Oct. 2020. doi: 10.1109/ICCIS49240.2020.9257708.
R. Sihwail, K. Omar, and K. A. Z. Ariffin, “An Effective Memory Analysis for Malware Detection and Classification,” Computers, Materials and Continua, vol. 67, no. 2, pp. 2301–2320, 2021, doi: 10.32604/cmc.2021.014510.
M. Alam, S. Sinha, S. Bhattacharya, S. Dutta, D. Mukhopadhyay, and A. Chattopadhyay, “RAPPER: Ransomware Prevention via Performance Counters,” Apr. 2020, [Online]. Available: http://arxiv.org/abs/2004.01712
N. Hampton, Z. Baig, and S. Zeadally, “Ransomware behavioural analysis on windows platforms,” Journal of Information Security and Applications, vol. 40, pp. 44–51, Jun. 2018, doi: 10.1016/j.jisa.2018.02.008.
K. Cabaj, M. Gregorczyk, and W. Mazurczyk, “Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics.”
T. R. Reshmi, “Information security breaches due to ransomware attacks - a systematic literature review,” International Journal of Information Management Data Insights, vol. 1, no. 2. Elsevier Ltd, Nov. 01, 2021. doi: 10.1016/j.jjimei.2021.100013.
M. Weninger, P. Grünbacher, E. Gander, and A. Schörgenhumer, “Evaluating an Interactive Memory Analysis Tool: Findings from a Cognitive Walkthrough and a User Study,” Proc ACM Hum Comput Interact, vol. 4, no. EICS, Jun. 2020, doi: 10.1145/3394977.
V. R. Sali and H. K. Khanuja, RAM Forensics: The Analysis and Extraction of Malicious processes from memory Image using GUI based Memory Forensic Toolkit. 2018.
R. Sihwail, K. Omar, K. A. Z. Ariffin, and S. Al Afghani, “Malware detection approach based on artifacts in memory image and dynamic analysis,” Applied Sciences (Switzerland), vol. 9, no. 18, Sep. 2019, doi: 10.3390/app9183680.
S.Poudyal, K. P. Subedi, and D. Dasgupta, A Framework for Analyzing Ransomware using Machine Learning. 2018.
I. Kara, “A Basic Malware Analysis Method,” Computer Fraud & Security, 2019.
J. Kävrestad, M. Birath, and N. Clarke, “Memory Analysis Tools,” 2024, pp. 211–219. doi: 10.1007/978-3-031-53649-6_19.
A. Singh, S. Taterh, and U. Mitra, “An Efficient Tactic for Analysis and Evaluation of Malware Dump File Using the Volatility Tool,” 2023, pp. 457. doi: 10.1007/s42979-023-01844-8.
F. Freiling, T. Grob, T. Muller, and R. Palutke, “Advances in Forensic Data Acquisition,” 2018, pp. 63-74. doi: 10.1109/MDAT.2018.2862366.