Ransomware: A New Era of Digital Terrorism
This work entails the study of ten nasty ransomwares to reveal out the analytical similarities and differences among them, which will help in understanding the mindset of cyber crooks crawling over the dark net. It also reviews the traps used by ransomware for its distribution and side by side examining the new possibilities of its dispersal. It conclude by divulging inter-relationship between various distribution approaches adopted by ransomwares and some attentive measures to hinder the ransomware and supporting alertness as ultimate tool of defense at user’s hand.
A. H. Weis, “Commercialization of the Internet”, Internet Research 20 (4) 2010, 420-435.
G. Owen, N. Savage, “The Tor Dark Net”, Global Commission on Internet Governance Paper Series No.
, Sept 2015, 1-20.
F. Wehinger, “The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related
Services”, European Intelligence & Security Informatics Conference, IEEE Computer Society, 2011, 209-213.
A. Liska, T. Gallo, “Ransomware: Defending against digital extortion”, O’Reilly Media, November 2016,
ISBN: 9781491967881, 190 pages.
K. Cabaj, M. Gregorczyk, W. Mazurczyk, “Software-Defined Networking-based Crypto Ransomware
Detection Using HTTP Traffic Characteristics”, Computers & Electrical Engineering 66 (2018), 353-68.
S. I. Popoola, U. B. Iyekekpolo, S. O. Ojewande, F. O. Sweetwilliams, S. N. John, “Ransomware: Current
Trend, Challenges and Research Directions”, WCECS 1 (2017), 0958-66.
X. Luo, Q. Liao, “Awareness Education as the key to Ransomware prevention”, Information System
Security, 16(2007), 195-202.
K. Savage, P. Coogan, H. Lau, “The evolution of ransomware”, Symantec Security Response (2015).
B. Rajesh, Y.R.J. Reddy, B.D.K. Reddy, “A Survey Paper on Malicious Computer Worms”, IJARCST 3(2) 2015,
N. Milošević, “History of Malware”, Computer Security, 2014, 1-11.
M. Khari, C. Bajaj, “Detecting Computer Viruses”, IJARCET 3(7) 2014, 2357-64.
I. You, K. Yim, “Malware Obfuscation Technique: A brief Survey”, International Conference on Broadband,
Wireless Computing, Communication and Application”, IEEE 2010, 297-300.
H. U. Salvi, R.V. Kerkar, “Ransomware: A Cyber Extortion”, Asian Journal of Convergence in Technology
A. Gazet, “Comparative Analysis of Ransomware Virii”, J. Computer Virology, 6(2010), 77-90
P.B. Pathak, “A Dangerous Trend of Cybercrime: Ransomware Growing Challenge”, IJARCET 5(2), (2016),
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”, Whitepaper 2008, bitcoin.org
C. Telly, “A Coin for the Tsar: The Two Disruptive Sides of Cryptocurrency”, Small Wars Journal, Jan 15,
D. Stroukal, B. Nedvedova, “Bitcoin and Other Cryptocurrency as an Instrument of Crime in Cyberspace”,
th Business and Management Conference (Istanbul), Oct 12, 2016, 219-226.
G. F. Hurlburt, I. Bojanova, “Bitcoin: Benefit or Curse?”, IT Trends (IEEE), 2014, 10-15.
K. Hegadekatti, “Regulating the Deep Web Through Controlled Blockchains and Cryptocurrency
Networks”, SSRN, 2016, 1-10.
M. Rutnik, “What is Cryptocurrency?”, Feature: Android Authority (Online), Feb 25, 2018.
“Rupee vs dollar: From 1990 to 2013”, Business (Rediff.com), Jun 12, 2013.
B. Lokuketagoda, M. Weerakoon, U. Madhushan, A.N. Senaratne, K.Y. Abeywardena, “R-Killer: An Email
Based Ransomware Protection Tool”, World Academy of Science, Engineering and Technology, International
Journal of Computer and Information Engineering 12 (2), 2018, 200-206.
J. Huang, J. Xu, X. Xing, P. Liu, M. K. Qureshi, “FlashGuard: Leveraging Intrinsic Flash Properties to Defend
Against Encryption Ransomware”, Proceedings of the ACM SIGSAC Conference on Computer and
Communications Security (2017), 2231- 44.
L. Invernizzi, P.M. Comparetti, “EVILSEED: A Guided Approach to Finding Malicious Web Pages”, IEEE
Symposium on Security and Privacy 2012, 428-442.
P. Muncaster, “CryptoDrop Tool Spots and Stops Ransomware in its Tracks”, News: InfoSecurity
Magazine, Jul 14, 2016. https://www.infosecurity-magazine.com/news/cryptodrop-spots-stopsransomware/
N. Scaife, H. Carter, P. Traynor, K.R.B. Butler, “CryptoLock (and Drop It): Stopping Ransomware Attacks
on User Data”, IEEE 36th International Conference on Distributed Computing Systems”, 2016, 303-12.
A. Kharraz, E. Kirda, “Redemption: Real-time Protection Against Ransomware at End-Hosts” International
Symposium on Research in Attacks, Intrusions, and Defenses (2017), 98-119.
N. Hachem, Y.B. Mustapha, G.G. Granadillo, H. Debar, “Botnets: Lifecycle and Taxonomy”, Conference
on Network and Information Systems Security (SAR-SSI) IEEE, 2011, 1-8.
B. Thuraisingham, L. Khan, M.M. Masud, K. W. Hamlen, “Data Mining for Security Applications”, IEEE/IFIP
International Conference on Embedded and Ubiquitous Computing (2008), 585-89.
A. Bhardwaj, V. Avasthi, H. Sastry, G.V.B. Subrahmanyam, “Ransomware Digital Extortion: A Rising New
Age Threat”, IJST 9(14), April 2016, 1-5.
P. Mahajan & A. Sachdeva “A Study of Encryption Algorithms AES, DES and RSA for Security”, Global
Journal of Computer Science and Technology 13 (15) 2013, 15-22.
A. A. Hasib, A.A.M.M. Haque, “A Comparative Study of the Performance and Security Issues of AES and
RSA Cryptography” 3rd International Conference on Convergence and Hybrid Information Technology
(2008) IEEE, 505- 510.
Exabeam, “The Anatomy of a Ransomware Attack”, White Paper (Threat Research Report) 2016, 1-13.
R. Leong, “Understanding Ransomware and Strategies to Defeat it”, White Paper (McAfee Labs), 1-16.
F-Secure, “Ransomware: How to predict, prevent, detect & respond”, White Paper (Threat Response),
S.S. Ganorkar, K. Kandasamy, “Understanding and Defending Crypto-Ransomware”, ARPN Journal of
Engineering and Applied Sciences 12 (12) 2017, 3920-25.
Deloitte, “Ransomware Holding Your Data Hostage”, Threat Study, Aug 12, 2016, 1-23.
M. Fimin, “Are employees part of the ransomware problem?”, Computer Fraud & Security, Aug 2017,
Copyright (c) 2018 Computer Reviews Journal
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.
Computer Reviews Journal allow the author(s) to retain publishing rights without restrictions.