A Security Investigation Survey of Ransomware Detection and Avoidance Strategies for IoT Networks

Year : 2023 | Volume :01 | Issue : 02 | Page : 14-23
By

Muhammad Nadeem

Syeda Wajiha Zahra

Muhammad Noman Abbasi

Ali Arshad

Saman Riaz

Waqas Ahmed

  1. Student Department of Computer Science and Technology, University of Science and Technology Beijing Beijing China
  2. Lecturer Department of Computer Science, Alhamd Islamic University Islamabad Pakistan
  3. Lecturer Department of Computer Science, Alhamd Islamic University Islamabad Pakistan
  4. Assistant Professor Department of Computer Science, National University of Technology Islamabad Pakistan
  5. Assistant Professor Department of Computer Science, National University of Technology Islamabad Pakistan
  6. Lecturer Department of Computer Science, Alhamd Islamic University Islamabad Pakistan

Abstract

The internet of things (IoT) refers to the interconnection of a large number of distinct physical objects, which in turn makes possible a variety of services and applications. Because the IoT sector is developing at such a rapid rate, ensuring its safety ought to be a high concern. At this time, ransomware attacks constitute the biggest danger to IoT posed by cyberattacks. Ransomware is software that blocks access to or usage of a victim’s computer and then demands money from the user in order to restore the machine to its previous state. In spite of the frequency of malware attacks, ransomware is considered to be the most devastating. This is due to the fact that it has caused companies to be interrupted, which has led to considerable cash loss while also creating a severe financial pressure on the organisation. Criminals may demand and collect extortion from victims while disguising their identities and whereabouts with the use of bitcoin, which is the most well-known cryptocurrency. A framework for the detection, prevention, and prediction of ransomware attacks has been established, and it is being used to conduct an analysis of various methodologies and tactics for detecting, preventing, and mitigating ransomware assaults.

Keywords: Internet of things (IoT), ransomware, prevention, detection, prediction

[This article belongs to International Journal of Information Security Engineering(ijise)]

How to cite this article: Muhammad Nadeem, Syeda Wajiha Zahra, Muhammad Noman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed. A Security Investigation Survey of Ransomware Detection and Avoidance Strategies for IoT Networks. International Journal of Information Security Engineering. 2023; 01(02):14-23.
How to cite this URL: Muhammad Nadeem, Syeda Wajiha Zahra, Muhammad Noman Abbasi, Ali Arshad, Saman Riaz, Waqas Ahmed. A Security Investigation Survey of Ransomware Detection and Avoidance Strategies for IoT Networks. International Journal of Information Security Engineering. 2023; 01(02):14-23. Available from: https://journals.stmjournals.com/ijise/article=2023/view=124831


Browse Figures

References

Khan NA, Ansari MT. Ransomware: a digital extortion. Int J Adv Innov Res. 2019; 6 (4): 47–52.
Ali M, Jung LT, Sodhro AH, Laghari AA, Belhaouari SB, Gillani Z. A confidentiality-based data classification-as-a-service (C2aaS) for cloud security. Alexandria Eng J. 2023; 64: 749–760.
Butt UA, Amin R, Mehmood M, Aldabbas H, Alharbi MT, Albaqami N. Cloud security threats and solutions: a survey. Wireless Pers Commun. 2023; 128 (1): 387–413.
Mohammad AH. Ransomware evolution, growth and recommendation for detection. Mod Appl Sci. 2020; 14 (3): 68–74.
Mallikarjunaradhya V, Pothukuchi AS, Kota LV. An overview of the strategic advantages of AI-powered threat intelligence in the cloud. J Sci Technol. 2023; 4 (4): 1–12.
Nadeem M, Arshad A, Riaz S, Zahra S, Rashid M, Band SS, Mosavi A. Preventing cloud network from spamming attacks using cloudflare and KNN. Computers Mater Continua. 2023; 74 (2): 2641–2659.
Reshmi TR. Information security breaches due to ransomware attacks – a systematic literature review. Int J Inform Manage Data Insights. 2021; 1: 100013.
Kapoor A, Gupta A, Gupta R, Tanwar S, Sharma G, Davidson IE. Ransomware detection, avoidance, and mitigation scheme: a review and future directions. Sustainability. 2021; 14 (1): 8.
Razaulla S, Fachkha C, Markarian C, Gawanmeh A, Mansoor W, Fung B, Assi C. The age of ransomware: a survey on the evolution, taxonomy, and research directions. IEEE Access. 2023; 11: 10698–40723.
Oz H, Arış A, Levi A, Uluagac S. A survey on ransomware: evolution, taxonomy, and defense solutions. ACM Comput Surveys. 2022; 54 (11): Article 238.
Chen Z-G, Kang H-S, Yin S-N, Kim S-R. Automatic ransomware detection and analysis based on dynamic API calls flow graph: In: RACS’17: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland, September 20–23, 2017. pp. 196–201.
Aljubory N, Khammas BM. Hybrid evolutionary approach in feature vector for ransomware detection. In: 2121 International Conference on Intelligent Technology, Systemand Service for Internet of Everything (ITSS-IoE), Sana’a, Yemen, November 1–2, 2021. pp. 1–6.
Arshad A, Nadeem M, Riaz S, Zahra SW, Dutta AK, Alzaid Z, Alabdan R, Almutairi B, Almotairi S. Hill Matrix and Radix-64 bit algorithm to preserve data confidentiality. Computers Mater Continua. 2023; 75 (2): 3065–3089.
Fang C, Nazari N, Omidi B, Wang H, Puri A, Arora M, Rafatirad S, Homayoun H, Khasawneh KN. HeteroScore: evaluating and mitigating cloud security threats brought by heterogeneity. In: Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA, February 27–March 3, 2023. pp. 1–15.
Saddheer M, Ahmad W, Nadeem M, Zahra SW, Arshad A, Riaz S. A decrease in the encryption latency utilizing transport layer protocols for software defined networks. J Netw Security. 2023; 11 (1): 24–38.
Kousalya A, Baik NK. Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. Int J Intell Netw. 2023; 4: 62–67.
Cabaj K, Gregorczyk M, Mazurczyk W. Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. Computers Electr Eng. 2018; 66: 353–368.
Sheik SA, Muniyandi AP. Secure authentication schemes in cloud computing with glimpse of artificial neural networks: a review. Cyber Security Appl. 2023; 1: 100002.
Zahra SW, Nadeem M, Ramzan A, Ahmad W, Arshad A, Riaz S, Saddheer M. Enhancing the cloud data security using keeper key and kernel tag. J Adv Shell Program. 2023; 10 (1): 35–46.
Wani A, Revathi S. Ransomware protection in IoT using software defined networking. Int J Electr Computer Eng. 2020; 10 (3): 3166–3175.
Ayesha JAK, Ahmad W, Nadeem M, Zahra SW, Arshad A, Riaz S, Shahid U. Baggage detection and recognition using local tri-directional pattern. Int J Mobile Comput Technol. 2023; 1 (1): 8–17.
Mathane V, Lakshmi PV. Predictive analysis of ransomware attacks using context-aware AI in IoT systems. Int J Adv Computer Sci Appl. 2021; 12 (4): 240–244.
Nadeem M, Arshad A, Riaz S, Zahra S, Dutta A, Moteri M, Alaybani S. An efficient technique to prevent data misuse with matrix cipher encryption algorithms. Computers Mater Continua. 2022; 74: 4059–4079.
Nadeem M, Arshad A, Riaz S, Zahra S, Band SS, Mosavi A. Two layer symmetric cryptography algorithm for protecting data from attacks. Computers Mater Continua. 2022; 74: 2625–2640. doi: 10.32604/cmc.2023.030899.
Nadeem M, Arshad A, Riaz S, Zahra S, Dutta Ashit, Alruban A, Almutairi B, Alaybani S. Two-layer security algorithms to prevent attacks on data in cyberspace. Appl Sci. 2022; 12: 9736. doi: 10.3390/app12199736.
Hossain ME. Enhancing the security of Caesar Cipher algorithm by designing a hybrid cryptography system. Int J Computer Appl. 2021; 183 (21): 55–57.
Akanksha D, Samreen R, Niharika GS, Shruthi A, Kiran MJ, Venkatramulu S. A hybrid cryptosystem based on modified vigenere cipher and polybius cipher. EPRA Int J Res Dev. 2022; 7 (6): 113–119.
Sun H, Grishman R. Lexicalized dependency paths based supervised learning for relation extraction. Computer Syst Sci Eng. 2022; 43 (3): 861–870.
Tan CMS, Arada GP, Abad AC, Magsino ER. A hybrid encryption and decryption algorithm using Caesar and Vigenere Cipher. J Phys Conf Ser. 2021; 1997 (1): 012021.
Krishnamoorthy N, Umarani S. Implementation and management of cloud security for Industry 4.0-data using hybrid elliptical curve cryptography. J High Technol Manage Res. 2023; 34 (2): 100474.
Sundar K, Sasikumar S, Jayakumar C, Nagarajan D, Karthick S. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing. Multimedia Tools Appl. 2023; 82: 4281742832.
Wu Y, Kang Z, Dai T, Cheng D. Managing cloud security in the presence of strategic hacker and joint responsibility. J Oper Res Soc. 2023. In press. doi: 10.1080/01605682.2023.2249506.
Alqahtani A, Sheldon FT. A survey of crypto ransomware attack detection methodologies: an evolving outlook. Sensors. 2022; 22 (5): 1837.
Tandon A, Nayyar A. A comprehensive survey on ransomware attack: a growing havoc cyberthreat. In: Balas V, Sharma N, Chakrabarti A, editors. Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, Volume 839. Singapore: Springer; 2019. pp. 403–420.
Rehman F, Muhammad Z, Asif S, Rahman H. The next generation of cloud security through hypervisor-based virtual machine introspection. In: 2023 3rd International Conference on Artificial Intelligence (ICAI), Islamabad, Pakistan. February 22–23, 2023. pp. 116–121.
Malecki F. Best practices for preventing and recovering from a ransomware attack. Computer Fraud Security. 2019; 3: 8–10.
George AS, Sagayarajan S. Securing cloud application infrastructure: understanding the penetration testing challenges of IaaS, PaaS, and SaaS environments. Partners Univ Int Res J. 2023; 2 (1):24–34.


Regular Issue Subscription Review Article
Volume 01
Issue 02
Received September 18, 2023
Accepted October 5, 2023
Published October 30, 2023