Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/8235
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMaigida, Abdullahi Mohammed-
dc.contributor.authorAbdulhamid, Shafi’i Muhammad-
dc.contributor.authorOlalere, Morufu-
dc.contributor.authorAlhassan, John K.-
dc.contributor.authorChiroma, Haruna-
dc.contributor.authorGbenga, Dada Emmanuel-
dc.date.accessioned2021-07-10T17:06:20Z-
dc.date.available2021-07-10T17:06:20Z-
dc.date.issued2019-03-13-
dc.identifier.citationhttps://doi.org/10.1007/s40860-019-00080-3en_US
dc.identifier.issn2199-4668-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/8235-
dc.description.abstractRansomware is advanced and upgraded malicious software which comes in the forms of Crypto or Locker, with the intention to attack and take control of basic infrastructures and computer systems. The vast majority of these threats are aimed at directly or indirectly making money from the victims by asking for a ransom in exchange for decryption keys. This systematic literature analysed the anatomy of ransomware, including its trends and mode of attacks to find the possible solutions by querying various academic literature. In contrast to previous reviews, sources of ransomware dataset are revealed in this review paper to ease the challenges of researchers in getting access to ransomware datasets. In addition, a taxonomy of ransomware current trends is presented in the paper. We discussed the articles in detail, the evolution and trend in ransomware researches. Most of the techniques deployed could not completely prevent ransomware attacks because of its obfuscation techniques, but rather recommend proper and regular backup of important files. This review can serve as a benchmark for researchers in proposing a novel ransomware detection methodology and starting point for novice researchers.en_US
dc.language.isoenen_US
dc.publisherJournal of Reliable Intelligent Environmentsen_US
dc.relation.ispartofseries5:67–89;-
dc.subjectRansomwareen_US
dc.subjectRansomware detectionen_US
dc.subjectMalwareen_US
dc.subjectCyber-attacken_US
dc.subjectCrypto ransomwareen_US
dc.subjectLocker ransomwareen_US
dc.titleSystematic Literature Review and Metadata Analysis of Ransomware Attacks and Detection Mechanismsen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
7.pdfSystematic literature review and metadata analysis of ransomware attacks and detection mechanisms1.03 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.