Abstract
Modern multilevel environmental monitoring systems are usually built on the basis of information infrastructure consisting of multiple servers and endpoints. Endpoints recently become targets for ransomware attacks. The nature and main principles of ransomware are presented. The main recommendations for detection and prevention of ransomware attacks are considered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kharraz A, Kirda E (2017) Redemption: real-time protection against ransomware at end-hosts. In: International symposium on research in attacks, intrusions, and defenses. Springer, Cham, pp 98–119
Hampton N, Baig ZA (2015) Ransomware: emergence of the cyber-extortion menace. In: Proceedings of the 13th Australian Information Security Management conference, Perth, pp 47–56
Taddeo M, Floridi L (2018) Regulate artificial intelligence to avert cyber arms race. Nature 556(7701):296–298
Byrne JM, Kimball KA (2017) Inside the Darknet: techno-crime and criminal opportunity. In: Criminal justice technology in the 21st century. Thomas Publisher, Springfield, pp 206–232
Bulazel WA, Yener B (2017) A survey on automated dynamic malware analysis evasion and counter-evasion. In: Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium (ROOTs). Article No. 2, ACM Press, pp 1–21
Young AL, Yung M (2017) Cryptovirology: the birth, neglect, and explosion of ransomware. Commun ACM 60(7):24–26
Richardson R, North M (2017) Ransomware: evolution, mitigation and prevention. Int Manag Rev 13(1):10–21
Miller DR, Harris S, Harper A, VanDyke S, Blask C (2010) Security information and event management (SIEM) implementation. McGraw Hill, New York, 464 p
Yaqoob I, Ahmed E, ur Rehman MH, Ahmed AIA, Al-garadi MA, Imran M, Guizani M (2017) The rise of ransomware and emerging security challenges in the internet of things. Comput Netw 129(Part 2):444–458
Thomas JE, Galligher GC (2018) Improving backup system evaluations in information security risk assessments to combat ransomware. Comp Inf Sci 11(1):14–25
Sauerwein C, Sillaber C, Mussmann A, Breu R (2017) Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings of 13th International Conference on Wirtschaftsinformatik (WI 2017), St. Gallen, pp 837–851
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature B.V.
About this paper
Cite this paper
Margarov, G., Mitrofanova, E. (2020). Management of Ransomware Detection and Prevention in Multilevel Environmental Monitoring Information System. In: Sidorenko, A., Hahn, H. (eds) Functional Nanostructures and Sensors for CBRN Defence and Environmental Safety and Security. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-1909-2_10
Download citation
DOI: https://doi.org/10.1007/978-94-024-1909-2_10
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-024-1908-5
Online ISBN: 978-94-024-1909-2
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)