Ransomware is the most artful kind of malware, influencing from a solitary client to a whole association. The attack causes data loss, data breaches, downtime, and relevant intellectual property theft. Two ransomware have been identified today, which comprise crypto ransomware and locker ransomware. They follow distribution and infection vectors the same way as traditional malware. They lack the high sophistication to break the current modern network hence the attackers pay for a malware installation services and charges by the number of installation. Based on the literature review that carried out in this project, it shows lack of knowledge between most of computer users about this type of malware. Most seriously, most of enterprises didn't have suitable counter measures to prepare for such attack. A Research methodology was done to eliminate the gap between the literature review and current situation globally. Different methods used to conduct this research including quantitative and qualitative research, different data collection tools and ethical consideration that were manner. The degree and modernity of ransomware is advancing at high rate and there is a need to build up a cyber-security model against ransomware assaults. This document goes into the details of multiple stages of a ransomware attack, design a systematic approach and tool to detect the Ransomware and came-up with best recommendations for both individuals and enterprises on how to stay safe before and after Ransomware strike. Indexing Terms: Ransomware; Monitoring; Malware; Protection;
Date of Award | Dec 2016 |
---|
Original language | American English |
---|
Supervisor | Ernesto Damiani (Supervisor) |
---|
- Ransomware; Monitoring; Malware; Protection.
Real Time Monitoring for Ransomware Detection
Al Awaadi, A. (Author). Dec 2016
Student thesis: Master's Thesis