[go: up one dir, main page]

Bhattacharya et al., 2017 - Google Patents

Ransomware: The CryptoVirus subverting cloud security

Bhattacharya et al., 2017

Document ID
11451020307678571914
Author
Bhattacharya S
Kumar C
Publication year
Publication venue
2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)

External Links

Snippet

Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Dargahi et al. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
US11347843B2 (en) Asset-based security systems and methods
Al-Hawamleh Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures
Brewer Ransomware attacks: detection, prevention and cure
Alhenaki et al. A survey on the security of cloud computing
An et al. Reviews on security issues and challenges in cloud computing
Hassan Ransomware revealed
Zakaria et al. The rise of ransomware
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
Lee et al. Ransomware prevention technique using key backup
Mos et al. Mobile security: A look into android
Popoola et al. Ransomware: Current trend, challenges, and research directions
Muslim et al. A study of ransomware attacks: Evolution and prevention
Goni et al. A study on cyber security: Analyzing current threats, navigating complexities, and implementing prevention strategies
Bhattacharya et al. Ransomware: The CryptoVirus subverting cloud security
Alhenaki et al. Security in cloud computing: a survey
Vander–Pallen et al. Survey on types of cyber attacks on operating system vulnerabilities since 2018 onwards
Aggarwal Ransomware attack: an evolving targeted threat
Guvçi et al. An improved protection approach for protecting from ransomware attacks
Belmabrouk Cyber criminals and data privacy measures
DS et al. A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants
Team The Ransomware Threat Landscape: What to Expect in 2022
Chopra et al. PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD
Al Faisal et al. Growing digital vulnerability: A case study of threats to Pakistans national assets
Alchi et al. Demystifying ransomware: classification, mechanism and anatomy