Identifying Ransomware Attack Patterns and Constructing Decrypting Tool

Authors

  • Megha Student, Department of Computer Science and Engineering, JEMTC Greater Noida
  • Disha Tiwari Student, Department of Computer Science and Engineering, JEMTC Greater Noida
  • Gaurav Nagarkoti Assistant Professor, Department of Computer Science and Engineering, JEMTC Greater Noida
  • Dr. Latha Banda HOD, Department of Computer Science and Engineering, JEMTC Greater Noida

Abstract

As everything moves quicker in the digital world, this research looks at ransomware attacks. It traces how they've changed from simple annoyances to planned cash-grab schemes. The study’s goal? Spot how the attacks happen and create better ways to notice them. It shows how urgent it is to find strong solutions. The impact isn't just on people, but on businesses and important systems too. This study is all about understanding the tough problems created by ransomware. It looks at how victim computers react and checks how the current detection methods work. By looking at how ransomware gets into computers and spreads, the goal is to help create a strong plan to spot it. This is important because it helps teachers, cybersecurity experts, and everyone online. It does this by filling in the gaps in our knowledge about how ransomware works. Additionally, it suggests detection methods that can change as the threats we face online change. Our research journey has three steps. The first three months involve reading a lot about the topic to gain deep knowledge. From the fourth to ninth month, we create and test various possible ransomware situations, taking care to think about their ethical impacts. The last three months are for reviewing what we’ve learned, deciding what the key facts are, and coming up with solid advice. This organized plan helps us do our research in a careful, step-by-step way, ensuring that we know what to expect and what to focus on at each stage. This study seeks to address important unknowns, yielding perspectives with broad consequences for stronger cyber-Defense. By outlining ransomware assault tendencies and putting forth innovative discovery methods, the examination considerably adds to scholarly learning and equips cybersecurity experts in shielding against the widespread danger of ransomware in the progressing computerized condition.

References

NA

Published

14-03-2024

How to Cite

Megha, Tiwari, D., Nagarkoti, G., & Banda, D. L. (2024). Identifying Ransomware Attack Patterns and Constructing Decrypting Tool . Journal of Applied Optics, 232–246. Retrieved from https://appliedopticsjournal.net/index.php/JAO/article/view/109

Issue

Section

Conference Paper

Most read articles by the same author(s)