Ransomware Detection and Prevention Using Honeypot

Year : 2024 | Volume :11 | Issue : 01 | Page : 8-13
By

Rutesh Bharat Autade

Yash Ashok Shinde

Snehal Shinde

Mayur Maruti Kumbhar

  1. Student Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani Maharashtra India
  2. Student Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani Maharashtra India
  3. Assistant Professor Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani Maharashtra India
  4. Student Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani Maharashtra India

Abstract

The significance of network security and explores the details of ransomware attacks, highlighting the crucial parameters essential to fortifying defences against this pernicious cyber threat. Network security involves safeguarding computer networks against unauthorized access, data breaches, and cyberattacks. Ransomware attack, a specific type of cyberattack, entail malicious software encrypting a computer system, making them unavailable to use in return attacker asks for ransom in form of cryptocurrency like Bitcoin or Ethereum These attacks can result in significant data loss and financial harm to individuals and organizations alike. In response to this vulnerability and to prevent data loss caused by such attacks, This specialized tool is meticulously designed to swiftly identify and mitigate ransomware threats in real-time. It conducts through ransomware analysis by examining ransom notes, file extensions, and ransomware-specific codes, allowing for accurate identification of ransomware variants and facilitating data recovery. Furthermore, the tool aids in classifying various ransomware families. With help of Honeypot this tool will lure attackers away from real systems. This tool aligns with network security principles, including Confidentiality, Integrity, and Availability.

Keywords: Ransomware, cybersecurity, honeypot

[This article belongs to Recent Trends in Electronics Communication Systems(rtecs)]

How to cite this article: Rutesh Bharat Autade, Yash Ashok Shinde, Snehal Shinde, Mayur Maruti Kumbhar. Ransomware Detection and Prevention Using Honeypot. Recent Trends in Electronics Communication Systems. 2024; 11(01):8-13.
How to cite this URL: Rutesh Bharat Autade, Yash Ashok Shinde, Snehal Shinde, Mayur Maruti Kumbhar. Ransomware Detection and Prevention Using Honeypot. Recent Trends in Electronics Communication Systems. 2024; 11(01):8-13. Available from: https://journals.stmjournals.com/rtecs/article=2024/view=150553

References

  1. Seamlessly safeguarding data against Ransomware attacks by Abu Elkhail, Nada lachtar Duha lbdh, January 2023, Vol no 20.
  2. Honeypot in Network Security: A Survey by Abhishek Mairh, Debabrat Barik Kanchan Verma, Oct 2015
  3. Ransomware Threat, Attack, Prevention and Cure on Window Platform by Shubham Sharma and Satwinder Singh, February 2020.
  4. A Review on Ransomware Detection Systems by Chamupathi Gigara Hettige, June 2023.
  5. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms by Juan A. Herrera-Silva and Myriam Hernandez Alvarez, January 2023.
  6. Analysis of Malicious Files Gathering via Honeypot Trap System and Benchmark of Anti-Virus Software, Ebu Yusuf Guven and M.Ali Aydin, Decmber2023.
  7. Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks by S. sibi chakkaravarthy, D. Sangeetha, Meenalosini Vimal Cruz, V. Vaidehi and Balasubramanian Raman, September 23,2020
  8. il Bae, G. bin Lee, and E. G. Im, “Ransomware detection using machine learning algorithms,” Jun. 2019, doi: 10.1002/cpe.5422.
  9. Mohurle and M. Patil, “A Brief Study of WannaCry Threat: Ransomware Attack 2017,” International Journal of Advanced Research in Computer Science (IJARCS).
  10. Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st Boston,MA, USA: Addison Wesley.
  11. Design_of_Intrusion_Detection_Honeypot_Using_Social Engineering.
  12. Survey of malware detection techniques by Aditya P.Mathur, Nwokedi Idika, Feb2007.
  13. PDF Malware Detection: Towards Machine Learning Modeling with Explainability Analysis, G.M. Sakhawat Hossain, Kaushik Deb, Helge Janicke and Iqbal H.Sarker, January 2024.

Regular Issue Subscription Review Article
Volume 11
Issue 01
Received April 18, 2024
Accepted May 14, 2024
Published May 25, 2024