The growth of ICT within the society has
become increasingly digitized, thus, the overall activity has amounted to various
researches for protecting any data from malicious threats. Recently, ransomware
has been a rapidly propagated subject for social engineering techniques
especially the ransomware. Users can delete a ransomeware code using an
antivirus software code. However, the encrypted data would be impossible to
recover. Therefore, ransomware must be prevented and must have early detection
before it infects any data. In this paper, we are proposing a quantification model
to prevent and detect any cryptographic operations in the local drive.
Han, B.J., Choi, Y.H. and Bae, B.C. (2013) Generating Malware DNA to Classify the Similar Malwares. Journal of the Korea Institute of Information Security & Cryptology, 23, 679-694. http://dx.doi.org/10.13089/JKIISC.2013.23.4.679
Savage, S., Wetherall, D., Karlin, A. and Anderson, T. (2000) Practical Network Support for IP Traceback. ACM SIGCOMM Computer Communication Review, 30, 295-306. http://dx.doi.org/10.1145/347057.347560
Park, K. and Lee, H. (2001) On the Effectiveness of Probabil-istic Packet Marking for IP Traceback under Denial of Service Attack. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, 1, 338-347.