Abstract
Ransomware is advanced and upgraded malicious software which comes in the forms of Crypto or Locker, with the intention to attack and take control of basic infrastructures and computer systems. The vast majority of these threats are aimed at directly or indirectly making money from the victims by asking for a ransom in exchange for decryption keys. This systematic literature analysed the anatomy of ransomware, including its trends and mode of attacks to find the possible solutions by querying various academic literature. In contrast to previous reviews, sources of ransomware dataset are revealed in this review paper to ease the challenges of researchers in getting access to ransomware datasets. In addition, a taxonomy of ransomware current trends is presented in the paper. We discussed the articles in detail, the evolution and trend in ransomware researches. Most of the techniques deployed could not completely prevent ransomware attacks because of its obfuscation techniques, but rather recommend proper and regular backup of important files. This review can serve as a benchmark for researchers in proposing a novel ransomware detection methodology and starting point for novice researchers.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abubakar AI, Chiroma H, Muaz SA, Ila LB (2015) A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Proc Comput Sci 62:221–227
Abdulhamid SM, Latiff MSA, Madni SHH, Oluwafemi O (2015) A survey of league championship algorithm: prospects and challenges. arXiv preprint arXiv:1603.09728
Abdullahi M, Ngadi MA (2016) Symbiotic organism search optimization based task scheduling in cloud computing environment. Future Gener Comput Syst 56:640–650
Ahmadian MM, Shahriari HR (2016) 2entFOX: a framework for high survivable ransomwares detection. In: 13th International ISC conference on information security and cryptology, ISCISC 2016, pp 79–84. https://doi.org/10.1109/ISCISC.2016.7736455
Al-rimy BAS, Maarof MA (2018) A 0-day aware crypto-ransomware early behavioral detection framework. Recent Trends Inf Commun Technol. https://doi.org/10.1007/978-3-319-59427-9
Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74(2018):144–166
Andronio N, Zanero S, Maggi F (2015) Heldroid: dissecting and detecting mobile ransomware. In: International workshop on recent advances in intrusion detection. Springer, Cham, pp 382–404
Aziz SM (2016) Ransomware in high-risk environments IT-792, independent research project December 2016 Advisor
Bhardwaj A, Avasthi V, Sastry H, Subrahmanyam GVB (2016) Ransomware digital extortion: a rising new age threat. Indian J Sci Technol 9(14):1–5. https://doi.org/10.17485/ijst/2016/v9i14/82936
Brewer R (2016) Ransomware attacks: detection, prevention and cure. Netw Secur 2016(9):5–9. https://doi.org/10.1016/S1353-4858(16)30086-1
Cabaj K, Gregorczyk M, Mazurczyk W (2015) Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. https://arxiv.org/ftp/arxiv/papers/1611/1611.08294.pdf. Accessed 27 Apr 2019
Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn GJ (2018) Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans Inf Forensics Secur 13(5):1286–1300
Choi K-S, Scott TM, Leclair DP, Ks C, Tm S, Dp L (2016) Ransomware against police: diagnosis of risk factors via application of cyber-routine activities theory virtual commons citation ransomware against police: diagnosis of risk factors via application of cyber-routine activities theory. Int J Forensic Sci Pathol 4(7):253–258. https://doi.org/10.19070/2332-287X-1600061
Coccaro R (2017) Evaluation of weaknesses in US cybersecurity and recommendations for improvement (Doctoral dissertation, Utica College)
Cohen A, Nissim N (2018) Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Syst Appl 102:158–178
Continella A, Guagnelli A, Zingaro G, Pasquale GD, Barenghi A, Zanero S, Maggi F (2016) ShieldFS: a self-healing, ransomware-aware filesystem. https://doi.org/10.1145/2991079.2991110
Deloitte (2016) Ransomware holding your data. Deloitte Threat Intelligence and Analytics. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk/us-aers-ransomware.pdf
Demuro PR (2017) Keeping internet pirates at bay: ransomware negotiation in the healthcare industry keeping internet pirates at bay: ransomware negotiation in the healthcare industry. Nova Law Rev 41(3):5
Ferrante A, Malek M, Martinelli F, Mercaldo F, Milosevic J (2017) Extinguishing ransomware—a hybrid approach to android ransomware detection. Springer, Cham
Formby D, Durbha S, Beyah R (2017) Out of control: ransomware for industrial control systems. In: RSA conference, 1–8. http://www.cap.gatech.edu/plcransomware.pdf. Accessed 27 Apr 2019
Gagneja KK (2017) Knowing the ransomware and building defense against it-specific to healthcare institutes. In: Proceedings of the 2017 3rd conference on mobile and secure services, MOBISECSERV 2017. https://doi.org/10.1109/MOBISECSERV.2017.7886569
Gómez-Hernández JA, Álvarez-González L, García-Teodoro P (2018) R-locker: thwarting ransomware action through a honeyfile-based approach. Comput Secur 73:389–398
Gupta G, Tripathi K (2017) Study on ransomware attack and its prevention. Int Educ Res J 3(5):260–262
Hampton N, Baig Z, Zeadally S (2018) Ransomware behavioural analysis on windows platforms. J Inf Secur Appl 40:44–51
Hernandez-Castro J, Cartwright E, Stepanova A (2017) Economic analysis of ransomware. Soc Sci Res Netw 2017(1):1–14. https://doi.org/10.2139/ssrn.2937641
Hong S, Chen J (2016) Poster: sdguard—an android application implementing privacy protection and ransomware detection, 26362. In: Proceedings of the 15th annual international conference on mobile systems, applications, and services. MobiSys '17, Niagara Falls, New York, USA, June 19–23, p 149. https://doi.org/10.1145/3081333.3089293
Idris I, Abdulhamid SM (2014) An improved AIS based e-mail classification technique for spam detection. arXiv preprint arXiv:1402.1242
Imran M, Guizani M, Yaqoob I, Ahmed E, Al-garadi MA, Imran M (2017) The rise of ransomware and emerging security challenges in the internet of things. Comput Netw. https://doi.org/10.1016/j.comnet.2017.09.003
Kharraz A, Arshad S, Mulliner C, Robertson W, Kirda E (2016) UNVEIL: a large-scale, automated approach to detecting ransomware. In: 25th USENIX security symposium (USENIX security 16), pp. 757–772
Kharraz A, Kirda E (2017) Redemption: real-time protection against ransomware at end-hosts. In: Dacier M, Bailey M, Polychronakis M, Antonakakis M (eds) Research in attacks, intrusions, and defenses. RAID 2017. Lecture notes in computer science, vol 10453. Springer, Cham, pp 98–119
Kiraz MS, Genç ZA, Öztürk E (2017) Detecting large integer arithmetic for defense against crypto ransomware. Cryptology, Report 2017/558. http://eprint.iacr.org/2017/558. Accessed 21 Dec 2018
Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—a systematic literature review. Inform Softw Technol 51(1):7–15
Kolodenker E, Koch W, Stringhini G, Egele M (2017) PayBreak: defense against cryptographic ransomware. AsiaCCS 15:599–611. https://doi.org/10.1145/3052973.3053035
Kruse CS, Frederick B, Jacobson T, Monticone DK (2017) Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care 25(1):1–10. https://doi.org/10.3233/THC-161263
Laszka A, Farhang S, Grossklags J (2017) On the economics of ransomware. http://arxiv.org/abs/1707.06247
Latiff MSA, Madni SHH, Abdullahi M (2018) Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm. Neural Comput Appl 29(1):279–293
Lee K, Yim K, Seo JT (2018) Ransomware prevention technique using key backup. Concurrency and Computation Practice and Experience 30(3):e4337
Lee J, Lee K (2018) Spillover effect of ransomware: economic analysis of web vulnerability market. Res Brief Inform Commun Technol Evol 3(20):1–11
Mercaldo F, Nardone V, Santone A (2016) Ransomware inside out. In: Proceedings—2016 11th international conference on availability, reliability and security, ARES 2016, 628–637. https://doi.org/10.1109/ARES.2016.35
Mercaldo F, Nardone V, Santone A, Visaggio CA (2016) Ransomware steals your phone. Formal methods rescue it. In: International conference on formal techniques for distributed objects, components, and systems. Springer, Cham, pp 212–221
Monika Zavarsky P, Lindskog D (2016) Experimental analysis of ransomware on windows and android platforms: evolution and characterization. Proc Comput Sci 94:465–472. https://doi.org/10.1016/j.procs.2016.08.072
Moore C (2016) Detecting ransomware with honeypot techniques. In: Proceedings—2016 cybersecurity and cyberforensics conference, CCC 2016, pp 77–81. https://doi.org/10.1109/CCC.2016.14
Nieuwenhuizen D (2017) A behavioural-based approach to ransomware detection. Whitepaper. MWR Labs Whitepaper
Patyal M, Sampalli S, Ye Q, Rahman M (2017). Multi-layered defense architecture against ransomware. Int J Bus Cyber Secur 1(2): 52–64. http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=121205538&site=eds-live&scope=site
Ray O, Hicks S, Moyle S (2017) Using ILP to analyse ransomware attacks. CEUR Workshop Proceedings 1865:54–59
Richardson R, North M (2017) Ransomware: evolution, mitigation and prevention. Int Manag Rev 13(1):10–22. https://doi.org/10.1108/17506200710779521
Saiyed BC (2016) CryptoLocker. Inform Syst Secur Assoc J 2016(4):14–18
Savage K, Coogan P, Lau H (2015) The evolution of ransomware. Secur Response 15:57. https://doi.org/10.5437/08953608X5403011
Scaife N, Carter H, Traynor P, Butler KRB (2016) CryptoLock (and Drop It): Stopping ransomware attacks on user data. In: Proceedings—international conference on distributed computing systems, 2016–Augus, pp 303–312. https://doi.org/10.1109/ICDCS.2016.46
SEC E (2017) Cybersecurity: ransomware alert. Natl Exam Progr Risk Alert 5(4):15–16
Sgandurra D, Muñoz-González L, Mohsen R, Lupu EC (2016) Automated dynamic analysis of ransomware: benefits, limitations and use for detection. Przeglad Elektrotechniczny 15:1–13. https://doi.org/10.15199/48.2015.11.48
Shaukat SK, Ribeiro VJ (2018) IEEE copyright notice: RansomWall: a layered defense system against cryptographic ransomware attacks using machine learning. This paper is a preprint (IEEE “accepted” status)
Silva JAH, Hernández-Alvarez M (2017) Large scale ransomware detection by cognitive security. In: Ecuador technical chapters meeting (ETCM), 2017 IEEE. IEEE, pp 1–4
Smith J (2017) Ransomware incident response for law enforcement (Doctoral dissertation, Utica College)
Song S, Kim B, Lee S (2016) The effective ransomware prevention technique using process monitoring on android platform. Mobile Inform Syst 2016:15–20. https://doi.org/10.1155/2016/2946735
Team T, Ringers D (2017) The cost of ransomware attacks. InforSec J 22(6):25–26
Upadhyaya R, Jain A (2017) Cyber ethics and cyber crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In: Proceeding—IEEE international conference on computing, communication and automation, ICCCA 2016, pp 143–148. https://doi.org/10.1109/CCAA.2016.7813706
Wecksten M, Frick J, Sjostrom A, Jarpe E (2017) A novel method for recovery from Crypto Ransomware infections. In: 2016 2nd ieee international conference on computer and communications, ICCC 2016—Proceedings, pp 1354–1358. https://doi.org/10.1109/CompComm.2016.7924925
Wyke J, Ajjan A (2015) The current state of ransomware 1(December):61
Yaqoob I, Ahmed E, Ur Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129:444–458
Yang T, Yang Y, Qian K, Lo DCT, Qian Y, Tao L (2015) Automated detection and analysis for android ransomware. In: Proceedings—2015 IEEE 17th international conference on high performance computing and communications. 2015 IEEE 7th international symposium on cyberspace safety and security and 2015 IEEE 12th international conference on embedded software and systems. H, (1), 1338–1343. https://doi.org/10.1109/HPCC-CSS-ICESS.2015.39
Zimba A, Wang Z, Chen H (2018) Multi-stage crypto ransomware attacks: a new emerging cyber threat to critical infrastructure and industrial control systems. ICT Express 4(1):14–18
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
Rights and permissions
About this article
Cite this article
Maigida, A.M., Abdulhamid, S.M., Olalere, M. et al. Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms. J Reliable Intell Environ 5, 67–89 (2019). https://doi.org/10.1007/s40860-019-00080-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40860-019-00080-3