Study and analyze the locky ransomware using malware analysis techniques

  • Authors

    • K Sri Vayuputra
    • Dr K.V.D Kiran
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10585
  • Ransom, Ransomware, Digital Assets, Locky, Encryption, Decryption.
  • Abstract

    Today most important tasks are carried in digital form this leads to increase in digital assets like laptops, smart phones, smart watches this involves in generate wide range of unique data storing in digital format like photos, voice clips, Documents, Videos, contacts etc. These all devices are connected to internet particularly laptops and smart phones. Weak security architectures always leads a chance to attackers to attack systems related to individuals, Corporates, Governments, Hospitals, Educational institutions etc. This attacks will bring huge data breaches, stealing of intellectual properties, encrypting the personal and confidential data.

  • References

    1. [1] Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious-Book by Andrew Honig and Michael Sikorski.

      [2] The Art of Computer Virus Research and Defense Book by PéterSzőr.

      [3] Practical Malware Analysis by Kris Kendall and Chad McMillan.

      [4] Malware Analysis: Tools and Techniques Rakesh Singh Kunwar, Priyanka Sharma.

      [5] Malware Analysis of WanaCry Ransomware Abdurrahman Akkas, Christos NestorasChachamis, LivioFetahu.

      [6] HTTPS traffic analysis and client identification using passiveSSL/TLS fingerprinting MartinHusák, Milan ˇCermák,TomášJirsík* andPavel ˇCeleda.

      [7] K.V.D.KIRAN,†MULTI CROSS PROTOCOL WITH HYBRID TOPOGRAPHY CONTROL FOR MANETSâ€, Journal of Theoretical and Applied Information Technology, 2017. Vol.95. No.3, ISSN: 1992-8645.

      [8] K.V.D.KIRAN,â€Integrated Distributed Architecture to Integrate Wireless Sensor Networks (WSN) with Grid for Healthcare,†International Journal of Bio-Science and Bio-Technologyâ€, Vol.7, No.3 (2015), pp.243-250, ISSN: 2233-7849 IJBSBT.

      [9] K.V.D.KIRAN,â€A Critical study of information security risk assessment using fuzzy and entropy methodologies,†International Journal on Computers and Communicationsâ€, Pages: 17-22,Vol1,Isuue1,Dec-,12, ISSN: 2319 – 8869.

      [10] K.V.D.KIRAN,†“Literature Review on RisK Literature Review on Risk and their Components†International Journal for Research in Emerging Science and Technology (IJREST) “,Volume-1, Issue-6, November 2014â€,(e-ISSN 2349-7610).

      [11] K.V.D.KIRAN,â€Performance Analysis of Layered Architecture to Integrate Mobile Devices and Grid computing with a resource scheduling algorithmâ€, IEEE CS’07, SIVAKASI, TAMIL NADU, India.

      [12] K.V.D.Kiran “Risk Assessment in Distributed Banking System,†International Journal of Applied Engineering Research (IJAER)â€, ISSN 0973-4562 Volume 9, Number 19 (2014) pp. 6087-6100.

      [13] K.V.D.Kiran, â€Analysis and Classification Scheme of Risk Assessment Miniatures placed on Different Criteria for Reducing the Riskâ€, International Journal of Applied Engineering Researchâ€pp.12069-12085, ISSN 0973-4562 Volume 9, Number 22 (2014).

      [14] K.V.D.Kiran,†Information Security risk authority in critical informative systemsâ€,CSIBIG 2014.

  • Downloads

  • How to Cite

    Sri Vayuputra, K., & K.V.D Kiran, D. (2018). Study and analyze the locky ransomware using malware analysis techniques. International Journal of Engineering & Technology, 7(2.7), 225-229. https://doi.org/10.14419/ijet.v7i2.7.10585

    Received date: 2018-03-25

    Accepted date: 2018-03-25

    Published date: 2018-03-18