Skip to main content

Management of Ransomware Detection and Prevention in Multilevel Environmental Monitoring Information System

  • Conference paper
  • First Online:
Functional Nanostructures and Sensors for CBRN Defence and Environmental Safety and Security

Abstract

Modern multilevel environmental monitoring systems are usually built on the basis of information infrastructure consisting of multiple servers and endpoints. Endpoints recently become targets for ransomware attacks. The nature and main principles of ransomware are presented. The main recommendations for detection and prevention of ransomware attacks are considered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kharraz A, Kirda E (2017) Redemption: real-time protection against ransomware at end-hosts. In: International symposium on research in attacks, intrusions, and defenses. Springer, Cham, pp 98–119

    Chapter  Google Scholar 

  2. Hampton N, Baig ZA (2015) Ransomware: emergence of the cyber-extortion menace. In: Proceedings of the 13th Australian Information Security Management conference, Perth, pp 47–56

    Google Scholar 

  3. Taddeo M, Floridi L (2018) Regulate artificial intelligence to avert cyber arms race. Nature 556(7701):296–298

    Article  ADS  Google Scholar 

  4. Byrne JM, Kimball KA (2017) Inside the Darknet: techno-crime and criminal opportunity. In: Criminal justice technology in the 21st century. Thomas Publisher, Springfield, pp 206–232

    Google Scholar 

  5. Bulazel WA, Yener B (2017) A survey on automated dynamic malware analysis evasion and counter-evasion. In: Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium (ROOTs). Article No. 2, ACM Press, pp 1–21

    Google Scholar 

  6. Young AL, Yung M (2017) Cryptovirology: the birth, neglect, and explosion of ransomware. Commun ACM 60(7):24–26

    Article  Google Scholar 

  7. Richardson R, North M (2017) Ransomware: evolution, mitigation and prevention. Int Manag Rev 13(1):10–21

    Google Scholar 

  8. Miller DR, Harris S, Harper A, VanDyke S, Blask C (2010) Security information and event management (SIEM) implementation. McGraw Hill, New York, 464 p

    Google Scholar 

  9. Yaqoob I, Ahmed E, ur Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the internet of things. Comput Netw 129(Part 2):444–458

    Article  Google Scholar 

  10. Thomas JE, Galligher GC (2018) Improving backup system evaluations in information security risk assessments to combat ransomware. Comp Inf Sci 11(1):14–25

    Google Scholar 

  11. Sauerwein C, Sillaber C, Mussmann A, Breu R (2017) Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings of 13th International Conference on Wirtschaftsinformatik (WI 2017), St. Gallen, pp 837–851

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature B.V.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Margarov, G., Mitrofanova, E. (2020). Management of Ransomware Detection and Prevention in Multilevel Environmental Monitoring Information System. In: Sidorenko, A., Hahn, H. (eds) Functional Nanostructures and Sensors for CBRN Defence and Environmental Safety and Security. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-1909-2_10

Download citation

Publish with us

Policies and ethics