ARCHIVES
Original Article
Ransomware Shield Detection and Prevention System
Lathika M1
Rajadhurai2
1M.Sc. CFIS, Department of Computer Science Engineering, Dr. MGR Educational and Research Institute, Chennai, Tamilnadu, India. 2Assistant Professor, Centre of Excellence in Digital Forensics, Chennai, Tamilnadu, India.
Published Online: January-April 2025
Pages: 188-192
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250401028References
1. Symantec. (2020). "Internet Security Threat Report." This report details ransomware trends, emphasizing encryption as a key attack
vector and the need for proactive defenses.
2. NIST. (2007). "SP 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC."
Provides the standard for AES-GCM, used in the Shield for secure encryption.
3. Rivest, R., Shamir, A., & Adleman, L. (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems."
Communications of the ACM, 21(2), 120-126. Introduces RSA, foundational to the system’s asymmetric encryption.
4. Al-Riyami, S., et al. (2019). "Hybrid Encryption Techniques for Ransomware Mitigation." Journal of Cybersecurity, 5(1). Explores
combining symmetric and asymmetric encryption, mirroring the Shield’s approach.
5. Scaife, N., et al. (2016). "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." IEEE International Conference on
Distributed Computing Systems, 303-312. Proposes file system monitoring for ransomware detection, a potential Shield enhancement.
6. Kharraz, A., et al. (2015). "Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks." DIMVA Conference, 3-24.
Analyzes ransomware behavior, suggesting detection via encryption patterns.
7. Young, A., et al. (2018). "Lightweight Cryptography for IoT Devices." IEEE Internet of Things Journal, 5(4), 2561-2570. Discusses
lightweight ciphers like XOR, used in the Shield’s simpler layers.
8. Berrueta, E., et al. (2020). "A Machine Learning Approach to Ransomware Detection Using Honeypots." IEEE Transactions on
Information Forensics and Security, 15, 2345-2356.Suggests honeypots for detection, an idea for Shield improvement.
9. Kok, S., et al. (2021). "Ransomware Mitigation Using Blockchain for Key Management." Computers & Security, 102, 102153. Proposes
blockchain for secure key storage, applicable to RSA key handling.
10. Hassan, N., et al. (2019). "Deep Learning for Ransomware Detection via Network Traffic Analysis." IEEE Access, 7, 123456-
123467.Uses deep learning on network traffic, a potential detection layer for the Shield.
11. Continella, A., et al. (2016). "ShieldFS: A Self-Healing File System Against Ransomware." ACM Transactions on Privacy and Security,
20(3), 1-30. Introduces I/O monitoring for ransomware defense, contrasting the Shield’s focus.
12. Mehnaz, S., et al. (2018). "Ransomware Prevention Using Cryptographic Key Traps." IEEE Symposium on Security and Privacy, 567-
582. Suggests key traps to delay attackers, a creative Shield upgrade.
13. Lee, J., et al. (2022). "Hardware-Assisted Memory Encryption for Ransomware Prevention." IEEE Transactions on Computers, 71(5),
1123-1135. Explores hardware encryption, a high-security option for the Shield.
14. Zhang, X., et al. (2019). "Dynamic Process Behavior Analysis for Ransomware Detection." Computers & Security, 88, 101654. Monitors
runtime behavior, suggesting a detection method for the Shield.
15. Beaman, C., et al. (2021). "Ransomware: Recent Advances, Analysis, Challenges and Future Directions." Computers & Security, 111,
102490. Reviews ransomware trends, providing context for the Shield’s development.
16. Cabaj, K., et al. (2018). "Software-Defined Networking-Based Crypto Ransomware Detection." Computers & Electrical Engineering,
66, 353-368. Uses HTTP traffic analysis, a network-based enhancement idea.
17. Almashhadani, A., et al. (2019). "A Multi-Classifier Network-Based Crypto Ransomware Detection System." IEEE Access, 7, 47053-
47067. Focuses on Locky ransomware detection, offering multi-method insights.
18. Ami, O., et al. (2018). "Ransomware Prevention Using Application Authentication." ACM Symposium on Applied Computing, 1610-
1619. Proposes authentication-based access control, a preventive strategy.
19. Chen, Q., & Bridges, R. (2017). "Automated Behavioral Analysis of WannaCry Ransomware." IEEE ICMLA, 454-460. Analyzes
WannaCry, relevant for testing the Shield’s encryption.
20. CISA. (2023). "#StopRansomware Guide." Cybersecurity and Infrastructure Security Agency. Offers best practices for ransomware
prevention and response, aligning with Shield goals.
vector and the need for proactive defenses.
2. NIST. (2007). "SP 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC."
Provides the standard for AES-GCM, used in the Shield for secure encryption.
3. Rivest, R., Shamir, A., & Adleman, L. (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems."
Communications of the ACM, 21(2), 120-126. Introduces RSA, foundational to the system’s asymmetric encryption.
4. Al-Riyami, S., et al. (2019). "Hybrid Encryption Techniques for Ransomware Mitigation." Journal of Cybersecurity, 5(1). Explores
combining symmetric and asymmetric encryption, mirroring the Shield’s approach.
5. Scaife, N., et al. (2016). "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." IEEE International Conference on
Distributed Computing Systems, 303-312. Proposes file system monitoring for ransomware detection, a potential Shield enhancement.
6. Kharraz, A., et al. (2015). "Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks." DIMVA Conference, 3-24.
Analyzes ransomware behavior, suggesting detection via encryption patterns.
7. Young, A., et al. (2018). "Lightweight Cryptography for IoT Devices." IEEE Internet of Things Journal, 5(4), 2561-2570. Discusses
lightweight ciphers like XOR, used in the Shield’s simpler layers.
8. Berrueta, E., et al. (2020). "A Machine Learning Approach to Ransomware Detection Using Honeypots." IEEE Transactions on
Information Forensics and Security, 15, 2345-2356.Suggests honeypots for detection, an idea for Shield improvement.
9. Kok, S., et al. (2021). "Ransomware Mitigation Using Blockchain for Key Management." Computers & Security, 102, 102153. Proposes
blockchain for secure key storage, applicable to RSA key handling.
10. Hassan, N., et al. (2019). "Deep Learning for Ransomware Detection via Network Traffic Analysis." IEEE Access, 7, 123456-
123467.Uses deep learning on network traffic, a potential detection layer for the Shield.
11. Continella, A., et al. (2016). "ShieldFS: A Self-Healing File System Against Ransomware." ACM Transactions on Privacy and Security,
20(3), 1-30. Introduces I/O monitoring for ransomware defense, contrasting the Shield’s focus.
12. Mehnaz, S., et al. (2018). "Ransomware Prevention Using Cryptographic Key Traps." IEEE Symposium on Security and Privacy, 567-
582. Suggests key traps to delay attackers, a creative Shield upgrade.
13. Lee, J., et al. (2022). "Hardware-Assisted Memory Encryption for Ransomware Prevention." IEEE Transactions on Computers, 71(5),
1123-1135. Explores hardware encryption, a high-security option for the Shield.
14. Zhang, X., et al. (2019). "Dynamic Process Behavior Analysis for Ransomware Detection." Computers & Security, 88, 101654. Monitors
runtime behavior, suggesting a detection method for the Shield.
15. Beaman, C., et al. (2021). "Ransomware: Recent Advances, Analysis, Challenges and Future Directions." Computers & Security, 111,
102490. Reviews ransomware trends, providing context for the Shield’s development.
16. Cabaj, K., et al. (2018). "Software-Defined Networking-Based Crypto Ransomware Detection." Computers & Electrical Engineering,
66, 353-368. Uses HTTP traffic analysis, a network-based enhancement idea.
17. Almashhadani, A., et al. (2019). "A Multi-Classifier Network-Based Crypto Ransomware Detection System." IEEE Access, 7, 47053-
47067. Focuses on Locky ransomware detection, offering multi-method insights.
18. Ami, O., et al. (2018). "Ransomware Prevention Using Application Authentication." ACM Symposium on Applied Computing, 1610-
1619. Proposes authentication-based access control, a preventive strategy.
19. Chen, Q., & Bridges, R. (2017). "Automated Behavioral Analysis of WannaCry Ransomware." IEEE ICMLA, 454-460. Analyzes
WannaCry, relevant for testing the Shield’s encryption.
20. CISA. (2023). "#StopRansomware Guide." Cybersecurity and Infrastructure Security Agency. Offers best practices for ransomware
prevention and response, aligning with Shield goals.
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025