IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v14y2021i1p8-d707240.html
   My bibliography  Save this article

Ransomware Detection, Avoidance, and Mitigation Scheme: A Review and Future Directions

Author

Listed:
  • Adhirath Kapoor

    (Model Institute of Engineering and Technology (Autonomous), Jammu 181122, India)

  • Ankur Gupta

    (Model Institute of Engineering and Technology (Autonomous), Jammu 181122, India)

  • Rajesh Gupta

    (Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)

  • Sudeep Tanwar

    (Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)

  • Gulshan Sharma

    (Department of Electrical Power Engineering, Steve Biko Campus, Durban University of Technology, Durban 4001, South Africa)

  • Innocent E. Davidson

    (Department of Electrical Power Engineering, Steve Biko Campus, Durban University of Technology, Durban 4001, South Africa)

Abstract

Ransomware attacks have emerged as a major cyber-security threat wherein user data is encrypted upon system infection. Latest Ransomware strands using advanced obfuscation techniques along with offline C2 Server capabilities are hitting Individual users and big corporations alike. This problem has caused business disruption and, of course, financial loss. Since there is no such consolidated framework that can classify, detect and mitigate Ransomware attacks in one go, we are motivated to present Detection Avoidance Mitigation (DAM), a theoretical framework to review and classify techniques, tools, and strategies to detect, avoid and mitigate Ransomware. We have thoroughly investigated different scenarios and compared already existing state of the art review research against ours. The case study of the infamous Djvu Ransomware is incorporated to illustrate the modus-operandi of the latest Ransomware strands, including some suggestions to contain its spread.

Suggested Citation

  • Adhirath Kapoor & Ankur Gupta & Rajesh Gupta & Sudeep Tanwar & Gulshan Sharma & Innocent E. Davidson, 2021. "Ransomware Detection, Avoidance, and Mitigation Scheme: A Review and Future Directions," Sustainability, MDPI, vol. 14(1), pages 1-24, December.
  • Handle: RePEc:gam:jsusta:v:14:y:2021:i:1:p:8-:d:707240
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/14/1/8/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/14/1/8/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. You-Shyang Chen & Jerome Chih-Lung Chou & Yu-Sheng Lin & Ying-Hsun Hung & Xuan-Han Chen, 2023. "Identification of SMEs in the Critical Factors of an IS Backup System Using a Three-Stage Advanced Hybrid MDM–AHP Model," Sustainability, MDPI, vol. 15(4), pages 1-29, February.
    2. Pigola, Angélica & Da Costa, Priscila Rezende & Ferasso, Marcos & Cavalcanti da Silva, Luís Fabio, 2024. "Enhancing cybersecurity capability investments: Evidence from an experiment," Technology in Society, Elsevier, vol. 76(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:14:y:2021:i:1:p:8-:d:707240. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.