Object

Title: WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms, Journal of Telecommunications and Information Technology, 2019, nr 1

Description:

In recent years, we have been experiencing fast proliferation of different types of ransomware targeting home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that received significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware. Dynamic analysis techniques are typically used to achieve that purpose, where the malicious binaries are executed in a controlled environment and are then observed. In this work, the dynamic analysis results focusing on the infamous WannaCry ransomware are presented. In particular, WannaCry is examined, during its execution in a purpose-built virtual lab environment, in order to analyze its infection, persistence, recovery prevention and propagation mechanisms. The results obtained may be used for developing appropriate detection and defense solutions for WannaCry and other ransomware families that exhibit similar behaviors

Publisher:

Instytut Łączności - Państwowy Instytut Badawczy

Format:

application/pdf

Resource Identifier:

ISSN 1509-4553, on-line: ISSN 1899-8852 ; oai:bc.itl.waw.pl:2076

Source:

Journal of Telecommunications and Information Technology

Language:

ang

Rights Management:

Biblioteka Naukowa Instytutu Łączności

Object collections:

Last modified:

Apr 15, 2019

In our library since:

Apr 15, 2019

Number of object content hits:

170

All available object's versions:

https://ribes-54.man.poznan.pl/publication/2364

Show description in RDF format:

RDF

Show description in OAI-PMH format:

OAI-PMH

Objects Similar

×

Citation

Citation style:

This page uses 'cookies'. More information