แจ้งเอกสารไม่ครบถ้วน, ไม่ตรงกับชื่อเรื่อง หรือมีข้อผิดพลาดเกี่ยวกับเอกสาร ติดต่อที่นี่ ==>
หากไม่มีอีเมลผู้รับให้กรอก thailis-noc@uni.net.th ติดต่อเจ้าหน้าที่เจ้าของเอกสาร กรณีเอกสารไม่ครบหรือไม่ตรง

Blockchain : tool for controlling ransomware through pre-encryption and post-encryption behavior

Organization : Galgotias University. Computing Science and Engineering
Email : 21scse3020003@galgotiasuniversity.edu.in

Organization : Galgotias University. Computing Science and Engineering
Email : md.21scse3010038@galgotiasuniversity.edu.in

Organization : Galgotias University. Computing Science and Engineering
Email : balamurugan.balusamy@snu.edu

Organization : Galgotias University. Computing Science and Engineering
Email : balamurugan.balusamy@snu.edu
keyword: Blockchain (Databases)
LCSH: Computer networks -- Security measures
; Ransomware (Computer software)
LCSH: Cryptography
; Data security
Abstract: Ransomware is a malware practice which cyber criminals usually inject through phishing practices to make money as their priority. With the high rise in the use of the internet amid the COVID phase, the cyber world is also reaching its peak as well. The attacker is also getting smarter with technology. We in this paper are taking blockchain technology as a weapon to fight against the terror of ransomware attacks, as this is the most notorious and devastating attack of all, and there is no doubt that it is going to be with us in the future too. Detection of ransomware attacks before they infect and decode the data is a complex thing. Several algorithms exist to detect attacks at their early stages, but the lack of information about the pre and post behavior similarities is proving to be an obstacle to accurately observing and detecting ransomware at its very first stage rather than making sense of paying the ransom and even not being sure of getting back the confidentialities. With the use of blockchain technology, we focus on making a record of the pre-encryption and post-encryption behaviour of ransomware attacks so that it is not going to be complex to track the nature, similarities, and behaviour of ransomware attacks. With inaccurate availability of data about pre and post behaviour of attacks and also weak design of detection models, both have a negative impact on selecting the features and similarities of the attack and thus developing a design model for the same. The paper is focusing on one of the most challenging variations of ransomware attacks, ie., the crypto ransomware. Many researches before proposed solutions as performing regular backup of files but this measure has a significant overhead too as key backup schemes I results in high computational cost as well. Thus, with the use of blockchain for gathering and maintaining records, we expect to be prepared for every unexpected attack.
King Mongkut's University of Technology North Bangkok. Central Library
Address: BANGKOK
Email: library@kmutnb.ac.th
Created: 2022
Modified: 2024-05-24
Issued: 2024-05-24
บทความ/Article
application/pdf
BibliograpyCitation : In IEEE Computer Society. 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT 2022) (pp.584-589). Los Alamitos, CA : IEEE Computer Society
eng
©copyrights King Mongkut's University of Technology North Bangkok
RightsAccess:
ลำดับที่.ชื่อแฟ้มข้อมูล ขนาดแฟ้มข้อมูลจำนวนเข้าถึง วัน-เวลาเข้าถึงล่าสุด
1 CCICT 2022pp.584-589.pdf 306 KB
ใช้เวลา
0.022301 วินาที

Singh, Anamika
Title Contributor Type
Blockchain : tool for controlling ransomware through pre-encryption and post-encryption behavior
มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ
Singh, Anamika;Ali, Akkas;Sharma, Vandana;Balamunugan, B.

บทความ/Article
Ali, Akkas
Title Contributor Type
Blockchain : tool for controlling ransomware through pre-encryption and post-encryption behavior
มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ
Singh, Anamika;Ali, Akkas;Sharma, Vandana;Balamunugan, B.

บทความ/Article
Sharma, Vandana
Title Contributor Type
Blockchain : tool for controlling ransomware through pre-encryption and post-encryption behavior
มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ
Singh, Anamika;Ali, Akkas;Sharma, Vandana;Balamunugan, B.

บทความ/Article
Balamunugan, B.
Title Contributor Type
Blockchain : tool for controlling ransomware through pre-encryption and post-encryption behavior
มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ
Singh, Anamika;Ali, Akkas;Sharma, Vandana;Balamunugan, B.

บทความ/Article
Copyright 2000 - 2026 ThaiLIS Digital Collection Working Group. All rights reserved.
ThaiLIS is Thailand Library Integrated System
สนับสนุนโดย สำนักงานบริหารเทคโนโลยีสารสนเทศเพื่อพัฒนาการศึกษา
กระทรวงการอุดมศึกษา วิทยาศาสตร์ วิจัยและนวัตกรรม
328 ถ.ศรีอยุธยา แขวง ทุ่งพญาไท เขต ราชเทวี กรุงเทพ 10400 โทร. โทร. 02-232-4000
Database server :
Version 2.5 Last update 1-06-2018
Power By SUSE PHP MySQL IndexData Mambo Bootstrap
มีปัญหาในการใช้งานติดต่อผ่านระบบ UniNetHelp


Server : 8.199.134
Client : Not ThaiLIS Member
From IP : 216.73.216.172