A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

02/11/2021
by   Harun Oz, et al.
0

In recent years, ransomware has been one of the most notorious malware targeting end users, governments, and business organizations. It has become a very profitable business for cybercriminals with revenues of millions of dollars, and a very serious threat to organizations with financial loss of billions of dollars. Numerous studies were proposed to address the ransomware threat, including surveys that cover certain aspects of ransomware research. However, no study exists in the literature that gives the complete picture on ransomware and ransomware defense research with respect to the diversity of targeted platforms. Since ransomware is already prevalent in PCs/workstations/desktops/laptops, is becoming more prevalent in mobile devices, and has already hit IoT/CPS recently, and will likely grow further in the IoT/CPS domain very soon, understanding ransomware and analyzing defense mechanisms with respect to target platforms is becoming more imperative. In order to fill this gap and motivate further research, in this paper, we present a comprehensive survey on ransomware and ransomware defense research with respect to PCs/workstations, mobile devices, and IoT/CPS platforms. Specifically, covering 137 studies over the period of 1990-2020, we give a detailed overview of ransomware evolution, comprehensively analyze the key building blocks of ransomware, present a taxonomy of notable ransomware families, and provide an extensive overview of ransomware defense research (i.e., analysis, detection, and recovery) with respect to platforms of PCs/workstations, mobile devices, and IoT/CPS. Moreover, we derive an extensive list of open issues for future ransomware research. We believe this survey will motivate further research by giving a complete picture on state-of-the-art ransomware research.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/21/2021

Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

As technology becomes more widely available, millions of users worldwide...
research
05/04/2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Insider threats are one of today's most challenging cybersecurity issues...
research
11/28/2017

Intelligent Notification Systems: A Survey of the State of the Art and Research Challenges

Notifications provide a unique mechanism for increasing the effectivenes...
research
06/09/2023

A Survey on Cross-Architectural IoT Malware Threat Hunting

In recent years, the increase in non-Windows malware threats had turned ...
research
09/08/2022

A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms

Malware is one of the most common and severe cyber-attack today. Malware...
research
04/17/2020

An Exploration of IoT Platform Development

Internet of Things platforms are key enablers for smart city initiatives...
research
07/04/2021

A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

Data provenance collects comprehensive information about the events and ...

Please sign up or login with your details

Forgot password? Click here to reset