Ransomware Detection and Prevention Using Honeypot

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : June 14, 2024 at 10:21 am | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : 8-13

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

Rutesh Bharat Autade, Yash Ashok Shinde, Snehal Shinde, Mayur Maruti Kumbhar

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Student, Assistant Professor, Student Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani, Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani, Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani, Department of Computer Engineering Pillai HOC College of Engineering and Technology, University of Mumbai, Rasayani Maharashtra, Maharashtra, Maharashtra, Maharashtra India, India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nThe significance of network security and explores the details of ransomware attacks, highlighting the crucial parameters essential to fortifying defences against this pernicious cyber threat. Network security involves safeguarding computer networks against unauthorized access, data breaches, and cyberattacks. Ransomware attack, a specific type of cyberattack, entail malicious software encrypting a computer system, making them unavailable to use in return attacker asks for ransom in form of cryptocurrency like Bitcoin or Ethereum These attacks can result in significant data loss and financial harm to individuals and organizations alike. In response to this vulnerability and to prevent data loss caused by such attacks, This specialized tool is meticulously designed to swiftly identify and mitigate ransomware threats in real-time. It conducts through ransomware analysis by examining ransom notes, file extensions, and ransomware-specific codes, allowing for accurate identification of ransomware variants and facilitating data recovery. Furthermore, the tool aids in classifying various ransomware families. With help of Honeypot this tool will lure attackers away from real systems. This tool aligns with network security principles, including Confidentiality, Integrity, and Availability.

n

n

n

Keywords: Ransomware, cybersecurity, honeypot

n[if 424 equals=”Regular Issue”][This article belongs to Recent Trends in Electronics Communication Systems(rtecs)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Recent Trends in Electronics Communication Systems(rtecs)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Rutesh Bharat Autade, Yash Ashok Shinde, Snehal Shinde, Mayur Maruti Kumbhar. Ransomware Detection and Prevention Using Honeypot. Recent Trends in Electronics Communication Systems. May 25, 2024; 11(01):8-13.

n

How to cite this URL: Rutesh Bharat Autade, Yash Ashok Shinde, Snehal Shinde, Mayur Maruti Kumbhar. Ransomware Detection and Prevention Using Honeypot. Recent Trends in Electronics Communication Systems. May 25, 2024; 11(01):8-13. Available from: https://journals.stmjournals.com/rtecs/article=May 25, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n[if 992 not_equal=”Open Access”]

[/if 992]n[if 992 not_equal=”Open Access”]

n


nn[/if 992]nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Seamlessly safeguarding data against Ransomware attacks by Abu Elkhail, Nada lachtar Duha lbdh, January 2023, Vol no 20.
  2. Honeypot in Network Security: A Survey by Abhishek Mairh, Debabrat Barik Kanchan Verma, Oct 2015
  3. Ransomware Threat, Attack, Prevention and Cure on Window Platform by Shubham Sharma and Satwinder Singh, February 2020.
  4. A Review on Ransomware Detection Systems by Chamupathi Gigara Hettige, June 2023.
  5. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms by Juan A. Herrera-Silva and Myriam Hernandez Alvarez, January 2023.
  6. Analysis of Malicious Files Gathering via Honeypot Trap System and Benchmark of Anti-Virus Software, Ebu Yusuf Guven and M.Ali Aydin, Decmber2023.
  7. Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks by S. sibi chakkaravarthy, D. Sangeetha, Meenalosini Vimal Cruz, V. Vaidehi and Balasubramanian Raman, September 23,2020
  8. il Bae, G. bin Lee, and E. G. Im, “Ransomware detection using machine learning algorithms,” Jun. 2019, doi: 10.1002/cpe.5422.
  9. Mohurle and M. Patil, “A Brief Study of WannaCry Threat: Ransomware Attack 2017,” International Journal of Advanced Research in Computer Science (IJARCS).
  10. Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st Boston,MA, USA: Addison Wesley.
  11. Design_of_Intrusion_Detection_Honeypot_Using_Social Engineering.
  12. Survey of malware detection techniques by Aditya P.Mathur, Nwokedi Idika, Feb2007.
  13. PDF Malware Detection: Towards Machine Learning Modeling with Explainability Analysis, G.M. Sakhawat Hossain, Kaushik Deb, Helge Janicke and Iqbal H.Sarker, January 2024.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Recent Trends in Electronics Communication Systems

n

[if 344 not_equal=””]ISSN: 2393-8757[/if 344]

n

n

n

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received April 18, 2024
Accepted May 14, 2024
Published May 25, 2024

n

n

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]