Bhattacharya et al., 2017 - Google Patents
Ransomware: The CryptoVirus subverting cloud securityBhattacharya et al., 2017
- Document ID
- 11451020307678571914
- Author
- Bhattacharya S
- Kumar C
- Publication year
- Publication venue
- 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)
External Links
Snippet
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology …
- 241000405758 Betapartitivirus 0 title description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dargahi et al. | A Cyber-Kill-Chain based taxonomy of crypto-ransomware features | |
| US11347843B2 (en) | Asset-based security systems and methods | |
| Al-Hawamleh | Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures | |
| Brewer | Ransomware attacks: detection, prevention and cure | |
| Alhenaki et al. | A survey on the security of cloud computing | |
| An et al. | Reviews on security issues and challenges in cloud computing | |
| Hassan | Ransomware revealed | |
| Zakaria et al. | The rise of ransomware | |
| Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
| Lee et al. | Ransomware prevention technique using key backup | |
| Mos et al. | Mobile security: A look into android | |
| Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
| Muslim et al. | A study of ransomware attacks: Evolution and prevention | |
| Goni et al. | A study on cyber security: Analyzing current threats, navigating complexities, and implementing prevention strategies | |
| Bhattacharya et al. | Ransomware: The CryptoVirus subverting cloud security | |
| Alhenaki et al. | Security in cloud computing: a survey | |
| Vander–Pallen et al. | Survey on types of cyber attacks on operating system vulnerabilities since 2018 onwards | |
| Aggarwal | Ransomware attack: an evolving targeted threat | |
| Guvçi et al. | An improved protection approach for protecting from ransomware attacks | |
| Belmabrouk | Cyber criminals and data privacy measures | |
| DS et al. | A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants | |
| Team | The Ransomware Threat Landscape: What to Expect in 2022 | |
| Chopra et al. | PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD | |
| Al Faisal et al. | Growing digital vulnerability: A case study of threats to Pakistans national assets | |
| Alchi et al. | Demystifying ransomware: classification, mechanism and anatomy |