The Evolution of Ransomware in Cybersecurity Space

Abstract

This paper discusses the evolution of ransomware in the cybersecurity space determining the threats of ransomware. The ransomware detection proposed in this method is based on machine learning algorithms. The proposed method applies sequences of the system API invocation as inputs. If an API log file is less than 10kb, it will not be executed properly and removed. As for the n-values, the best results are achieved when the n-value is an average of four.

Country : USA

1 Dr. Alex Mathew

  1. Department of Cybersecurity, Bethany College, USA

IRJIET, Volume 6, Issue 3, March 2022 pp. 88-90

doi.org/10.47001/IRJIET/2022.603013

References

  1. D. Zhuravchak, “RANSOMWARE SPREAD PREVENTION SYSTEM USING PYTHON, AUDITD AND LINUX”, Cybersecurity: Education, Science, Technique, vol. 4, no. 12, pp. 108-116, 2021. Available:10.28925/2663-4023.2021.12.108116.
  2. S.Fuloria, “Cybersecurity and Ransomware,” Academia Letters, 2022. Available: 10.20935/al4820.
  3. Y. ITAI and E. Onwubiko, “Impact of Ransomware on Cybersecurity,” INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, vol. 17, no. 1, pp. 7077-7080, 2018. Available: 10.24297/ijct.v17i1.6750.
  4. M. Byrne, “Cybersecurity and the New Age of Ransomware Attacks,” Journal of Peri Anesthesia Nursing, vol. 36, no. 5, pp. 594-596, 2021. Available: 10.1016/j.jopan.2021.07.004.
  5. A.Mohammad, “Ransomware Evolution, Growth and Recommendation for Detection,” Modern Applied Science, vol. 14, no. 3, p. 68, 2020. Available: 10.5539/mas.v14n3p68.
  6. S. Yadav, “A Survey on Ransomware Malware and Ransomware Detection Techniques,” International Journal for Research in Applied Science and Engineering Technology, vol. 10, no. 1, pp. 243-248, 2022. Available: 10.22214/ijraset.2022.39787.
  7. S. Alsoghyer and I. Almomani, “Ransomware Detection System for Android Applications,” Electronics, vol. 8, no. 8, p. 868, 2019. Available: 10.3390/electronics8080868.