Question

In: Computer Science

What is the main contribution include in the Ransomware?

What is the main contribution include in the Ransomware?

Solutions

Expert Solution

First learn what is Ransomware?

Ransomware is a form of malware that blackmails its victim. The name “ransomware” comes from the ransom note asking its victim to pay some ransom in return for gaining back access to their data or device, or for the attacker not to divulge the victim’s embarrassing or compromising information. It usually spreads through malicious e-mail attachments, infected software apps, infected external storage devices or compromised websites. Unlike other types of malware which typically try to remain undetected, ransomware exposes itself at some stage of its execution in order to deliver the ransom demand to its victim. This demand is usually presented with a note that appears on the screen before or after the encryption occurs, outlining the threat and accompanied by a detailed set of instructions for making the payment, typically through a cryptocurrency.

Now main contribution :

The main contribution of this paper is a predictive model of ransomware stages, which came out from a study of 18 ransomware families by looking into Windows Application Programming Interface (API) function calls during each ransomware execution. Another contribution of this research focuses on querying and interviewing ransomware victims to find common factors between attacks, in order to be able to generate a more high-level understanding of ransomware deployment methods.

The rest of the paper is organised as follows. The "Ransomware overview" section provides a more in-depth look into ransomware, including its attack vectors, the way it may target user files, as well as an outline of related work, both in understanding ransomware and in combating it. The "Methodology" section outlines the two-pronged methodology used in our research, namely the development of a predictive model of ransomware deployment, and the user study to gain better understanding on ransomware deployment. The "Results, analysis and discussion" section presents the results of our research, in particular the predictive model of ransomware deployment involving the stages of ransomware deployment, leading to ideas for preventive action to deal with ransomware deployment threat effectively. The results from the user study are also summarised, analysed and discussed, shedding light into the ransomware victims’ perception and behaviour in the aftermath of a ransomware incident. All of these may contribute towards better techniques in combating ransomware. "Conclusion" section concludes our paper and presents some ideas for future work.

We developed a Methodology :

We developed a predictive model of ransomware, in our attempt to characterise all variants of each family of ransomware into one model. The process included the development of a classifier (to parse, classify and output graphs detailing the behavioural constructs of a ransomware), as well as creating a safe environment to analyse the ransomware samples.

In conjunction to this model, we carried out a user study to get a picture of ransomware deployment process.

I hop you like my Answer Thank you!!!


Related Solutions

Explain Arrow's impossibility theorem. What is Arrow's main conclusion? What is his main contribution ?
Explain Arrow's impossibility theorem. What is Arrow's main conclusion? What is his main contribution ?
Research a Ransomware attack. In your discussion include: victim of attack, vector of infection, symptoms, variant...
Research a Ransomware attack. In your discussion include: victim of attack, vector of infection, symptoms, variant of ransomware used, number of systems affected, cost of ransom (was it paid?), were the systems recovered (from backup or decrypted), etc.? Do you agree with the actions taken by the victim in response to the attack?
What are the main differences between a defined benefit pension and a defined contribution pension?
What are the main differences between a defined benefit pension and a defined contribution pension?
#include <iostream> #include <string> #include <fstream> #include <vector> #include <sstream> using namespace std; int main() {...
#include <iostream> #include <string> #include <fstream> #include <vector> #include <sstream> using namespace std; int main() { ifstream infile("worldpop.txt"); vector<pair<string, int>> population_directory; string line; while(getline(infile, line)){ if(line.size()>0){ stringstream ss(line); string country; int population; ss>>country; ss>>population; population_directory.push_back(make_pair(country, population)); } } cout<<"Task 1"<<endl; cout<<"Names of countries with population>=1000,000,000"<<endl; for(int i=0;i<population_directory.size();i++){ if(population_directory[i].second>=1000000000){ cout<<population_directory[i].first<<endl; } } cout<<"Names of countries with population<=1000,000"<<endl; for(int i=0;i<population_directory.size();i++){ if(population_directory[i].second<=1000000){ cout<<population_directory[i].first<<endl; } } } can u pls explain the logic behind this code up to 10 lines pls, many thanks
Why are areas of a healthcare system particularly vulnerable to ransomware and should be especially protected?  What...
Why are areas of a healthcare system particularly vulnerable to ransomware and should be especially protected?  What might patients do to ensure their information is safeguarded?
"What are the seven different types of financial institutions? Include a description of the main services...
"What are the seven different types of financial institutions? Include a description of the main services offered by each." (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Provide a definition of the term, liquidity.
What are the main design considerations (please include benefits and consequences) associated with stopping, decision and...
What are the main design considerations (please include benefits and consequences) associated with stopping, decision and passing site distance?
#include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> int main(int argc, char *argv[]) {     FILE *myFile;...
#include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> int main(int argc, char *argv[]) {     FILE *myFile;     char fname[20];     //int sum = 0;     int i, j, k, tmp =0;     int num = 0;     int mass = 0;     int count = 0;     int fuel = 0;     int total = 0;     int M[1000];     char ch;     char buffer[32];     printf(" Input the filename to be opened : ");     scanf("%s",fname);     myFile = fopen(fname, "r");     if(myFile == NULL)     {         printf("Can't open file\n");     } while(1)     {         ch =...
Please implement the 5 questions in source code: #include <stdio.h> #include <stdlib.h> #include <math.h> int main(...
Please implement the 5 questions in source code: #include <stdio.h> #include <stdlib.h> #include <math.h> int main( int argc, char* argv[] ) { // Size of vectors int n = 10000; // Input vectors double *restrict a; double *restrict b; // Output vector double *restrict c; // Size, in bytes, of each vector size_t bytes = n*sizeof(double); /* Q1: Allocate memory for vector a (10 points)*/ /* Q2: Allocate memory for vector b (10 points)*/ /* Q3: Allocate memory for vector...
How are the ethical principles of nonmaleficence and beneficence violated by ransomware that could be in...
How are the ethical principles of nonmaleficence and beneficence violated by ransomware that could be in a healthcare organization's information system?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT