A Security Investigation Survey of Ransomware Detection and Avoidance Strategies for IoT Networks

[{“box”:0,”content”:”

n

Year : October 30, 2023 | Volume : 01 | Issue : 02 | Page : 16-26

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Muhammad Nadeem, Syeda Wajiha Zahra, Muhammad Noman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed

  1. [/foreach]

    n

n

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Lecturer, Lecturer, Assistant Professor, Assistant Professor, Lecturer, Department of Computer Science and Technology, University of Science and Technology Beijing, Department of Computer Science, Alhamd Islamic University, Department of Computer Science, Alhamd Islamic University, Department of Computer Science, National University of Technology, Department of Computer Science, National University of Technology, Department of Computer Science, Alhamd Islamic University, Beijing, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad, China, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan
  2. n[/if 1175][/foreach]

n

n

Abstract

nThe Internet of Things (IoT) refers to the interconnection of a large number of distinct physical objects, which in turn makes possible a variety of services and applications. Because the Internet of Things (IoT) sector is developing at such a rapid rate, ensuring its safety ought to be a high concern. At this time, ransomware attacks constitute the biggest danger to the Internet of Things (IoT) posed by cyberattacks. Ransomware is software that blocks access to or usage of a victim’s computer and then demands money from the user in order to restore the machine to its previous state. In spite of the frequency of malware attacks, ransomware is considered to be the most devastating. This is due to the fact that it has caused companies to be interrupted, which has led to considerable cash loss while also creating a severe financial pressure on the organisation. Criminals may demand and collect extortion from victims while disguising their identities and whereabouts with the use of bitcoin, which is the most well-known cryptocurrency. A framework for the detection, prevention, and prediction of ransomware attacks has been established, and it is being used to conduct an analysis of various methodologies and tactics for detecting, preventing, and mitigating ransomware assaults.

n

n

n

Keywords: IoT, ransomware, prevention, detection, prediction

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Information Security Engineering(ijise)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Information Security Engineering(ijise)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Muhammad Nadeem, Syeda Wajiha Zahra, Muhammad Noman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed A Security Investigation Survey of Ransomware Detection and Avoidance Strategies for IoT Networks ijise October 30, 2023; 01:16-26

n

How to cite this URL: Muhammad Nadeem, Syeda Wajiha Zahra, Muhammad Noman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed A Security Investigation Survey of Ransomware Detection and Avoidance Strategies for IoT Networks ijise October 30, 2023 {cited October 30, 2023};01:16-26. Available from: https://journals.stmjournals.com/ijise/article=October 30, 2023/view=0/

nn


nn[if 992 equals=”Open Access”] Full Text PDF[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘ijise’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Khan NA, Ansari MT. RANSOMWARE: A DIGITAL EXTORTION. language. International Journal of Advance and Innovative Research. 2019 Oct;6(4):47-52.
  2. Ali M, Jung LT, Sodhro AH, Laghari AA, Belhaouari SB, Gillani Z. A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security. Alexandria Engineering Journal. 2023 Feb 1;64:749-60.
  3. Butt, U. A., Amin, R., Mehmood, M., Aldabbas, H., Alharbi, M. T., & Albaqami, N. (2023). Cloud security threats and solutions: A survey. Wireless Personal Communications, 128(1), 387-413.
  4. Adel Hamdan Mohammad. (2020), Ransomware Evolution, Growth and Recommendation for Detection, Modern Applied Science; Vol. 14, No. 3; 2020
  5. Mallikarjunaradhya, V., Pothukuchi, A. S., & Kota, L. V. (2023). An Overview of the Strategic Advantages of AI-Powered Threat Intelligence in the Cloud. Journal of Science & Technology, 4(4), 1-12.
  6. Nadeem, M., Arshad, A., Riaz, S., Zahra, S., Rashid, M., S Band, S., & Mosavi, A. (2022). Preventing cloud network from spamming attacks using cloudflare and KNN.
  7. R. Reshmi Information security breaches due to ransomware attacks – a systematic literature review. International Journal of Information Management Data Insights 1 (2021) 100013
  8. Kapoor, Adhirath & Gupta, Ankur & Gupta, Rajesh & Tanwar, Sudeep & Sharma, Gulshan & Davidson, Inno. (2021). Ransomware Detection, Avoidance, and Mitigation Scheme: A Review and Future Directions. Sustainability.
  9. Razaulla, Salwa & Fachkha, Claude & Markarian, Christine & Gawanmeh, Amjad & Mansoor, Wathiq & Fung, Benjamin & Assi, Chadi. (2023). the Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions. IEEE Access. PP. 1-1.
  10. Oz, Harun & Arış, Ahmet & Levi, Albert & Uluagac, Selcuk. (2022). A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Computing Surveys.
  11. -G. Chen, H.-S. Kang, S.-N. Yin and S.-R. Kim, Automatic ransomware detection and analysis based on dynamic API calls flow graph, in Proc. Int. Conf. Res. Adapt. Convergent Syst., Sep. 2017, pp. 196–201.
  12. Aljubory and B. M. Khammas, Hybrid evolutionary approach in feature vector for ransomware detection, in Proc. Int. Conf. Intel. Technol., Syst. Service Internet Everything (ITSS-IoE), Nov. 2021, pp. 1–6.
  13. Arshad, A., Nadeem, M., Riaz, S., Zahra, S. W., Dutta, A. K., Alzaid, Z., … & Almotairi, S. (2023). Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality. Computers, Materials & Continua, 75(2).
  14. Fang, C., Nazari, N., Omidi, B., Wang, H., Puri, A., Arora, M., … & Khasawneh, K. N. (2023, March). Heteroscore: Evaluating and mitigating cloud security threats brought by heterogeneity. In Network and Distributed System Security (NDSS) Symposium.
  15. Saddheer, M., Ahmad, W., Nadeem, M., Zahra, S. W., Arshad, A., & Riaz, S. (2023). A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks.
  16. Kousalya, A., & Baik, N. K. (2023). Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. International Journal of Intelligent Networks, 4, 62-67.
  17. Cabaj, M. Gregorczyk, and W. Mazurczyk, Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics, Comput. Electr. Eng., vol. 66, pp. 353–36
  18. Sheik, S. A., & Muniyandi, A. P. (2023). Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review. Cyber Security and Applications, 1, 100002.
  19. Zahra, S. W., Nadeem, M., Ramzan, A., Ahmad, W., Arshad, A., Riaz, S., & Saddheer, M. (2023). Enhancing the Cloud Data Security Using Keeper Key and Kernel Tag.
  20. Wani and S. Revathi, Ransomware protection in IoT using software defined networking, Int. J. Electr. Comput. Eng. (IJECE), vol. 10, no. 3, p. 3166, Jun. 2020.
  21. Ayesha, J. A. K., Ahmad, W., Nadeem, M., Zahra, S. W., Arshad, A., Riaz, S., & Shahid, U. (2023). Baggage Detection and Recognition Using Local Tri-Directional Pattern. International Journal of Mobile Computing Technology, 1(1), 8-17p.
  22. Mathane and P. V. Lakshmi, Predictive analysis of ransomware attacks using context-aware AI in IoT systems, Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 4, pp. 240–244, 2021.
  23. Zahra, Syeda & Nadeem, Muhammad & Ahmad, Waqas & Arshad, Ali & Riaz, Saman & Saddheer, Muhammad. (2023). Enhancing the Cloud Data Security Using Keeper Key and Kernel Tag. 10.
  24. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & Zahra, Syeda & Dutta, Ashit & Moteri, Moteeb & Alaybani, Sultan. (2022). An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms. Computers, Materials and Continua. 74. 4059-4079.
  25. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & Zahra, Syeda & S. Band, Shahab & Mosavi, Amir. (2022). Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks. Computers, Materials and Continua. 74. 2625-2640. 10.32604/cmc.2023.030899.
  26. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & Zahra, Syeda & Dutta, Ashit & Alruban, Abdulrahman & Almutairi, Badr & Alaybani, Sultan. (2022). Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace. Applied Sciences. 12. 9736. 10.3390/app12199736.
  27. Md H. Enhancing the security of caesar cipher algorithm by designing a hybrid cryptography system. Int. J. Comput. Appl. 2021;183:55-7.
  28. Akanksha, D.; Samreen, R.; Niharika, G.S.; Shruthi, A.; Kiran, M.J.; Venkatramulu, S. A hybrid cryptosystem based on modified vigenere cipher and polybius cipher. EPRA Int. J. Res. Dev. 2022, 7, 2455–7838
  29. Sun and R. Grishman, Lexicalized dependency paths based supervised learning for relation extraction,” Computer Systems Science and Engineering, vol. 43, no. 3, pp. 861–870, 2022.
  30. Tan, C. M. S., Arada, G. P., Abad, A. C., & Magsino, E. R. (2021, August). A hybrid encryption and decryption algorithm using caesar and vigenere cipher. In Journal of Physics: Conference Series (Vol. 1997, No. 1, p. 012021). IOP Publishing.
  31. Krishnamoorthy, N., & Umarani, S. (2023). Implementation and management of cloud security for industry 4. O-data using hybrid elliptical curve cryptography. The Journal of High Technology Management Research, 34(2), 100474.
  32. Sundar, K., Sasikumar, S., Jayakumar, C., Nagarajan, D., & karthick, S. (2023). Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing. Multimedia Tools and Applications, 1-16.
  33. Wu, Y., Kang, Z., Dai, T., & Cheng, D. (2023). Managing cloud security in the presence of strategic hacker and joint responsibility. Journal of the Operational Research Society, 1-14.
  34. Alqahtani, A., & Sheldon, F. T. (2022). A survey of crypto ransomware attack detection methodologies: an evolving outlook. Sensors, 22(5), 1837.
  35. Tandon, A., & Nayyar, A. (2019). A comprehensive survey on ransomware attack: A growing havoc cyberthreat. Data Management, Analytics and Innovation: Proceedings of ICDMAI 2018, Volume 2, 403-420.
  36. Reshmi, T. R. (2021). Information security breaches due to ransomware attacks-a systematic literature review. International Journal of Information Management Data Insights, 1(2), 100013.
  37. Rehman, F., Muhammad, Z., Asif, S., & Rahman, H. (2023, February). The next generation of cloud security through hypervisor-based virtual machine introspection. In 2023 3rd International Conference on Artificial Intelligence (ICAI) (pp. 116-121). IEEE.
  38. Malecki, F. (2019). Best practices for preventing and recovering from a ransomware attack. Computer Fraud & Security, 2019(3), 8-10.
  39. George, A. S., & Sagayarajan, S. (2023). Securing Cloud Application Infrastructure: Understanding the Penetration Testing Challenges of IaaS, PaaS, and SaaS Environments. Partners Universal International Research Journal, 2(1), 24-34.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

Regular Issue Subscription Review Article

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 01
Issue 02
Received September 18, 2023
Accepted October 5, 2023
Published October 30, 2023

n

n

n

[if 1190 not_equal=””]n

Editor

n

[foreach 1188]n

n[/foreach]

n[/if 1190] [if 1177 not_equal=””]n

Reviewer

n

[foreach 1176]n

n[/foreach]

n[/if 1177]

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n n function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]