A Review of Ransomware Families and Detection Methods

Helen Jose Chittooparambil, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti, Mirjam Jonkman, Ganthan Narayana Samy

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedingspeer-review

Abstract

Ransomware has become a significant problem and its impact is getting worse. It has now become a lucrative business as it is being offered as a service. Unlike other security issues, the effect of ransomware is irreversible and difficult to stop. This research has analysed existing ransomware classifications and its detection and prevention methods. Due to the difficulty in categorizing the steps none of the existing methods can stop ransomware. Ransomware families are identified and classified from the year 1989 to 2017 and surprisingly there are not much difference in the pattern. This paper concludes with a brief discussion about the findings and future work of this research.
Original languageEnglish
Title of host publicationRecent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018
EditorsFaisal Saeed, Nadhmi Gazem, Fathey Mohammed, Abdelsalam Busalim
Place of PublicationCham, Switzerland
PublisherSpringer, Cham
Pages588-597
Number of pages10
Volume843
ISBN (Electronic)978-3-319-99007-1
ISBN (Print)978-3-319-99006-4
DOIs
Publication statusPublished - 2019
Event3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 - Kuala Lumpur, Malaysia
Duration: 23 Jun 201824 Jun 2018

Publication series

Name Advances in Intelligent Systems and Computing
PublisherSpringer
Volume843
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
Country/TerritoryMalaysia
CityKuala Lumpur
Period23/06/1824/06/18

Fingerprint

Dive into the research topics of 'A Review of Ransomware Families and Detection Methods'. Together they form a unique fingerprint.

Cite this