当前位置: X-MOL 学术Egypt. Inform. J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Internet of things and ransomware: Evolution, mitigation and prevention
Egyptian Informatics Journal ( IF 5.0 ) Pub Date : 2020-05-28 , DOI: 10.1016/j.eij.2020.05.003
Mamoona Humayun , NZ Jhanjhi , Ahmed Alsayat , Vasaki Ponnusamy

Internet of things architecture is the integration of real-world objects and places with the internet. This booming in technology is bringing ease in our lifestyle and making formerly impossible things possible. Internet of things playing a vital role in bridging this gap easily and rapidly. IoT is changing our lifestyle and the way of working the technologies, by bringing them together at the one page in several application areas of daily life. However, IoT has to face several challenges in the form of cyber scams, one of the major challenges IoT has to face is the likelihood of Ransomware attack. Ransomware is a malicious kind of software that restricts access to vital information in some way and demand payment for getting access to this information. The ransomware attack is becoming widespread daily, and it is bringing disastrous consequences, including loss of sensitive data, loss of productivity, data destruction, and loss of reputation and business downtime. Which further leads to millions of dollar daily losses due to the downtime. This is inevitable for organizations to revise their annual cybersecurity goals and need to implement proper resilience and recovery plan to keep business running. However, before proceeding towards providing a practical solution, there is a need to synthesize the existing data and statistics about this crucial attack to make aware to the researchers and practitioners. To fill this gap, this paper provides a comprehensive survey on evolution, prevention and mitigation of Ransomware in IoT context. This paper differs from existing in various dimensions: firstly, it provides deeper insights about Ransomware evolution in IoT. Secondly; it discusses diverse aspects of Ransomware attacks on IoT which include, various types of Ransomware, Current research in Ransomware, Existing techniques to prevent and mitigate Ransomware attacks in IoT along with the ways to deal with an affected machine, the decision about paying the ransom or not, and future emerging trends of Ransomware propagation in IoT. Thirdly, a summary of current research is also provided to show various directions of research. In sum, this detailed survey is expected to be useful for researchers and practitioners who are involved in developing solutions for IoT security.



中文翻译:

物联网和勒索软件:演变,缓解和预防

物联网架构是现实世界中的对象和场所与互联网的集成。技术的飞速发展使我们的生活方式更加轻松,使以前不可能的事情成为可能。物联网在轻松快速地弥合这一差距方面发挥着至关重要的作用。物联网通过将它们整合到日常生活中几个应用领域的一页上,从而改变了我们的生活方式和技术的工作方式。但是,物联网必须以网络诈骗的形式面临若干挑战,物联网必须面对的主要挑战之一是勒索软件攻击的可能性。勒索软件是一种恶意软件,它以某种方式限制对重要信息的访问,并要求付费才能访问此信息。勒索软件攻击每天都在蔓延,并带来灾难性的后果,包括敏感数据丢失,生产力损失,数据破坏以及声誉和业务停机时间的损失。由于停机时间,这进一步导致数百万美元的每日损失。对于组织而言,这不可避免地需要修改其年度网络安全目标,并且需要实施适当的弹性和恢复计划以保持业务正常运转。但是,在着手提供切实可行的解决方案之前,需要综合有关这种关键攻击的现有数据和统计信息,以使研究人员和从业人员了解到这一点。为了填补这一空白,本文提供了有关物联网环境下勒索软件的演变,预防和缓解的全面调查。本文在各个方面与现有文献有所不同:首先,它提供了有关物联网中勒索软件演进的更深刻见解。其次; 它讨论了针对IoT的勒索软件攻击的各个方面,其中包括各种类型的勒索软件,勒索软件的最新研究,预防和减轻IoT中勒索软件攻击的现有技术以及应对受影响机器的方式,支付赎金或否,以及物联网中勒索软件传播的未来新兴趋势。第三,还提供了当前研究的摘要,以显示研究的各个方向。总而言之,该详细调查预期对参与开发物联网安全解决方案的研究人员和从业人员很有用。是否支付赎金的决定,以及物联网中勒索软件传播的未来新兴趋势。第三,还提供了当前研究的摘要,以显示研究的各个方向。总而言之,该详细调查预期对参与开发物联网安全解决方案的研究人员和从业人员很有用。是否支付赎金的决定以及物联网中勒索软件传播的未来新兴趋势。第三,还提供了当前研究的摘要,以显示研究的各个方向。总而言之,该详细调查预期对参与开发物联网安全解决方案的研究人员和从业人员很有用。

更新日期:2020-05-28
down
wechat
bug