The Automation Model of Ransomware Analysis and Detection Pattern |
Lee, Hoo-Ki
(Department of IT Policy and Management, Soongsil University)
Seong, Jong-Hyuk (Department of Information Security Systems, Kyonggi University) Kim, Yu-Cheon (Department of Information Security, Dongguk University) Kim, Jong-Bae (Graduate School of Software, Soongsil University) Gim, Gwang-Yong (Dept. of Business Administration, Soongsil University) |
1 | Korea Ransomware Infringement Response Center (2017. February). 2017 Ransomware Infringement Analysis Report [Internet], Available: https://www.rancert.com/bbs/bbs.php?bbs_id=notice&mode=view&id=52. |
2 | KISA (2017. January). 16-year Ransomware trend and 17-year outlook [Internet], Available: http://www.krcert.or.kr/data/reportView.do?bulletin_writing_sequence=24983. |
3 | J. M. Youn, J. G. Jo, and J. C. Ryu, "Methodology for intercepting the ransomware attacks using file i/o intervals," Journal of The Korea Institute of Information Security & Cryptology, vol.26, no.3, pp.645-653, Jun. 2016. DOI |
4 | G. S. Kim and M. S. Kang, "The next generation of cyber security issues and threats and countermeasures," Journal of the Institute of Electronics and Information Engineers, vol. 41, no. 4, pp. 69-77, Apr. 2014. |
5 | Hauri (2017. March). Virobot Security Magazine[Internet], Available: http://www.hauri.co.kr/information/magazine_view.html?intSeq=95&page=1. |
6 | Kbench (2017. February). Evolving Korea customized Ransomware. Venus Locker variant disguised as educational schedule discovery in Korea [Internet]. Available: http://www.kbench.com/?q=node/172991. |
7 | Symantec (2016. June). An Special report: Ransomware and Business [Internet], Available: https://www.symantec.com/connect/blogs/report-organizations-must-respond-increasing-threat-ransomware. |
8 | Trendmicro (2016. July). Why Ransomware is 'Eaten' Part 2: Penteration Strategy [Internet]. Available: http://www.trendmicro.co.kr/kr/blog/ransomware-arrival-methods/index.html. |
9 | Badware.info (2016. December), Malicious Link Diffusion Detection System Trend Analysis Report [Internet]. Available: http://www.uproot.im/pdf/badware.pdf. |
10 | B. J. Kim, W. S. Kim, J. H. Lee, S. H. Yim, S. G. Song, and S. J. Lee, "Design and implementation of a ransomware prevention system using process monitoring on android platform," Proceedings of the Korean institute of information scientists and engineers, pp. 852-853, Dec. 2015. |
11 | J. Y. Moon and Y. H. Chang, "Ransomware analysis and method for minimize the damage," The Journal of the Convergence on Culture Technology, vol. 2, no. 1, pp.79- 85, Feb. 2016. DOI |
12 | Malwarebytes (2017, January). 2017 State of Malware Report[Internet]. Available: https://blog.malwarebytes.com/malwarebytes-news/2017/02/2016-state-of-malware-report/. |
13 | SonicWall (2017. February). 2017 SonicWall Annual Threat Report [Internet]. https://www.sonicwall.com/whitepaper/2017-sonicwall-annual-threat-report8121810/. |