ARCHIVES

Original Article

Ransomware Shield Detection and Prevention System

Lathika M1 Rajadhurai2
1M.Sc. CFIS, Department of Computer Science Engineering, Dr. MGR Educational and Research Institute, Chennai, Tamilnadu, India. 2Assistant Professor, Centre of Excellence in Digital Forensics, Chennai, Tamilnadu, India.

Published Online: January-April 2025

Pages: 188-192

References

1. Symantec. (2020). "Internet Security Threat Report." This report details ransomware trends, emphasizing encryption as a key attack
vector and the need for proactive defenses.
2. NIST. (2007). "SP 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC."
Provides the standard for AES-GCM, used in the Shield for secure encryption.
3. Rivest, R., Shamir, A., & Adleman, L. (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems."
Communications of the ACM, 21(2), 120-126. Introduces RSA, foundational to the system’s asymmetric encryption.
4. Al-Riyami, S., et al. (2019). "Hybrid Encryption Techniques for Ransomware Mitigation." Journal of Cybersecurity, 5(1). Explores
combining symmetric and asymmetric encryption, mirroring the Shield’s approach.
5. Scaife, N., et al. (2016). "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." IEEE International Conference on
Distributed Computing Systems, 303-312. Proposes file system monitoring for ransomware detection, a potential Shield enhancement.
6. Kharraz, A., et al. (2015). "Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks." DIMVA Conference, 3-24.
Analyzes ransomware behavior, suggesting detection via encryption patterns.
7. Young, A., et al. (2018). "Lightweight Cryptography for IoT Devices." IEEE Internet of Things Journal, 5(4), 2561-2570. Discusses
lightweight ciphers like XOR, used in the Shield’s simpler layers.
8. Berrueta, E., et al. (2020). "A Machine Learning Approach to Ransomware Detection Using Honeypots." IEEE Transactions on
Information Forensics and Security, 15, 2345-2356.Suggests honeypots for detection, an idea for Shield improvement.
9. Kok, S., et al. (2021). "Ransomware Mitigation Using Blockchain for Key Management." Computers & Security, 102, 102153. Proposes
blockchain for secure key storage, applicable to RSA key handling.
10. Hassan, N., et al. (2019). "Deep Learning for Ransomware Detection via Network Traffic Analysis." IEEE Access, 7, 123456-
123467.Uses deep learning on network traffic, a potential detection layer for the Shield.
11. Continella, A., et al. (2016). "ShieldFS: A Self-Healing File System Against Ransomware." ACM Transactions on Privacy and Security,
20(3), 1-30. Introduces I/O monitoring for ransomware defense, contrasting the Shield’s focus.
12. Mehnaz, S., et al. (2018). "Ransomware Prevention Using Cryptographic Key Traps." IEEE Symposium on Security and Privacy, 567-
582. Suggests key traps to delay attackers, a creative Shield upgrade.
13. Lee, J., et al. (2022). "Hardware-Assisted Memory Encryption for Ransomware Prevention." IEEE Transactions on Computers, 71(5),
1123-1135. Explores hardware encryption, a high-security option for the Shield.
14. Zhang, X., et al. (2019). "Dynamic Process Behavior Analysis for Ransomware Detection." Computers & Security, 88, 101654. Monitors
runtime behavior, suggesting a detection method for the Shield.
15. Beaman, C., et al. (2021). "Ransomware: Recent Advances, Analysis, Challenges and Future Directions." Computers & Security, 111,
102490. Reviews ransomware trends, providing context for the Shield’s development.
16. Cabaj, K., et al. (2018). "Software-Defined Networking-Based Crypto Ransomware Detection." Computers & Electrical Engineering,
66, 353-368. Uses HTTP traffic analysis, a network-based enhancement idea.
17. Almashhadani, A., et al. (2019). "A Multi-Classifier Network-Based Crypto Ransomware Detection System." IEEE Access, 7, 47053-
47067. Focuses on Locky ransomware detection, offering multi-method insights.
18. Ami, O., et al. (2018). "Ransomware Prevention Using Application Authentication." ACM Symposium on Applied Computing, 1610-
1619. Proposes authentication-based access control, a preventive strategy.
19. Chen, Q., & Bridges, R. (2017). "Automated Behavioral Analysis of WannaCry Ransomware." IEEE ICMLA, 454-460. Analyzes
WannaCry, relevant for testing the Shield’s encryption.
20. CISA. (2023). "#StopRansomware Guide." Cybersecurity and Infrastructure Security Agency. Offers best practices for ransomware
prevention and response, aligning with Shield goals.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401028

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.