Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022 Feb 25;22(5):1837.
doi: 10.3390/s22051837.

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

Affiliations
Review

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

Abdullah Alqahtani et al. Sensors (Basel). .

Abstract

Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems. Due to its unique characteristics, ransomware has attracted the attention of security professionals and researchers toward achieving safer and higher assurance systems that can effectively detect and prevent such attacks. The state-of-the-art crypto ransomware early detection models rely on specific data acquired during the runtime of an attack's lifecycle. However, the evasive mechanisms that these attacks employ to avoid detection often nullify the solutions that are currently in place. More effort is needed to keep up with an attacks' momentum to take the current security defenses to the next level. This survey is devoted to exploring and analyzing the state-of-the-art in ransomware attack detection toward facilitating the research community that endeavors to disrupt this very critical and escalating ransomware problem. The focus is on crypto ransomware as the most prevalent, destructive, and challenging variation. The approaches and open issues pertaining to ransomware detection modeling are reviewed to establish recommendations for future research directions and scope.

Keywords: crypto ransomware; data centric; deep learning; early detection; event-based detection; machine learning-based detection; malware; process centric.

PubMed Disclaimer

Conflict of interest statement

We declare no conflict of interest.

Figures

Figure 1
Figure 1
Generic design of crypto ransomware early detection models.
Figure 2
Figure 2
Cause–effect diagram illustrating the limitations in existing crypto-ransomware early detection solutions.

Similar articles

Cited by

References

    1. Al-rimy B.A.S., Maarof M.A., Shaid S.Z.M. A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework. Springer International Publishing; Cham, Germany: 2018.
    1. Al-rimy B.A.S., Maarof M.A., Prasetyo Y.A., Shaid S.Z.M., Ariffin A.F.M. Zero-day aware decision fusion-based model for crypto-ransomware early detection. Int. J. Integr. Eng. 2018;10 doi: 10.30880/ijie.2018.10.06.011. - DOI
    1. Aboaoja F.A., Zainal A., Ghaleb F.A., Al-rimy B.A.S. Toward an Ensemble Behavioral-based Early Evasive Malware Detection Framework; Proceedings of the 2021 International Conference on Data Science and Its Applications (ICoDSA); Bandung, Indonesia. 6–7 October 2021; Piscataway, NJ, USA: IEEE; 2021.
    1. Al-rimy B.A.S., Maarof M.A., Shaid S.Z.M. Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Gener. Comput. Syst. 2019;101:476–491. doi: 10.1016/j.future.2019.06.005. - DOI
    1. Al-Rimy B.A.S., Maarof M.A., Alazab M., Shaid S.Z.M., Ghaleb F.A., Almalawi A., Ali A.M., Al-Hadhrami T. Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection. Future Gener. Comput. Syst. 2021;115:641–658. doi: 10.1016/j.future.2020.10.002. - DOI

MeSH terms

LinkOut - more resources