5 research outputs found

    Cryptovirology Ransomware: A Review of Dissemination and Mitigation Techniques

    Get PDF
    Digital assets are generally regarded as one of the most valuable assets for an organization. When they are captured for ransom purposes, a serious problem arises, and ransomware is responsible for this. When ransomware gets onto a computer or other electronic device, the data on it is encrypted, made inaccessible, or taken away until a ransom is paid. The culprits behind these activities release and disseminate new and sophisticated variants of illicit wealth and notorious practices. Hardware and antivirus software that detect intrusions are not a permanent solution, as hackers can bypass them easily. After ransomware has been executed on an electronic device, it is extremely difficult or nearly impossible to recover the data, and now is the time to draw attention to this threat. In this study, various aspects of ransomware’s propagation, encryption, and mitigation techniques are discussed. We have also used the RanSim simulator to detect malware in a system, and details of the experiment are presented in the later sections. The methodology used for this study can be classified as exploratory research to explore the recent literature on the topic. This study contributes by highlighting recent trends in ransomware, their consequences, and prevention and mitigation techniques. Keywords: RanSim, Ransomware, Ransomware Threats and Mitigation, System Implications of Ransomware, Trusted Computing. Digital assets are generally regarded as one of the most valuable assets for an organization. When they are captured for ransom purposes, a serious problem arises, and ransomware is responsible for this. When ransomware gets onto a computer or other electronic device, the data on it is encrypted, made inaccessible, or taken away until a ransom is paid. The culprits behind these activities release and disseminate new and sophisticated variants of illicit wealth and notorious practices. Hardware and antivirus software that detect intrusions are not a permanent solution, as hackers can bypass them easily. After ransomware has been executed on an electronic device, it is extremely difficult or nearly impossible to recover the data, and now is the time to draw attention to this threat. In this study, various aspects of ransomware’s propagation, encryption, and mitigation techniques are discussed. We have also used the RanSim simulator to detect malware in a system, and details of the experiment are presented in the later sections. The methodology used for this study can be classified as exploratory research to explore the recent literature on the topic. This study contributes by highlighting recent trends in ransomware, their consequences, and prevention and mitigation techniques

    Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare

    Get PDF
    With the increasing need for secure transmission and storage of medical images, the development of robust encryption algorithms is of paramount importance. Securing sensitive digital medical imagery information during transmission has emerged as a critical priority in the e-Healthcare systems. Recent research has highlighted the significance of developing advanced medical image encryption algorithms to ensure secure transmission during telediagnosis and teleconsultations. In this study, we propose a novel medical image encryption algorithm which is based on a novel substitution-box generation algebraic method using a combination of a multiplicative cyclic group with an order of 256 and a permutation group with a large order. To evaluate the security performance of the proposed generated S-box, various standard security indicators are assessed and analyzed. The newly proposed medical image encryption algorithm utilizes the generated S-box, along with bit-plane slicing, circular shifting, and XOR operations, to achieve enhanced security and robustness for encrypting sensitive imagery data. In order to assess the effectiveness of the proposed encryption algorithm, a comprehensive benchmarking analyses, specifically designed for evaluating image encryption schemes, have been conducted. The results obtained from the comparison and other analyses serve to validate the optimal features and high cryptographic strength exhibited by the proposed method. Hence, the proposed algorithm demonstrates significant effectiveness and holds considerable promise in the realm of medical image encryption for secure e-Healthcare systems

    Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine

    No full text
    Due to privacy and sensitivity of the medical images, the creation of strong medical image encryption schemes has gained the attention of cryptographers. In this study, a robust medical image encryption scheme is developed involving a fuzzy subset of integers from 1 to 256 characterized by membership values. The S-box entries are determined using a precise mathematical formulation. Various standard analyses are performed to check the reliability and security of the newly devised S-box. Furthermore, this newly devised S-box is utilized to design proposed encrypting technique. A thorough benchmarking analysis that is specifically designed for image encryption schemes has been conducted in order to assess the algorithm’s performance. The findings of these analyses obtained through the proposed scheme, in comparison to some recently developed image encryption schemes; show that the proposed approach exhibits exceptional attributes and formidable cryptographic potency. Consequently, the algorithm not only showcases remarkable effectiveness but also holds great promise in the realm of securing medical images for telemedicine

    Enhancing Cybersecurity in the Internet of Things Environment Using Bald Eagle Search Optimization With Hybrid Deep Learning

    No full text
    Nowadays, the Internet of Things (IoT) has become a rapid development; it can be employed by cyber threats in IoT devices. A correct system to recognize malicious attacks at IoT platforms became of major importance to minimize security threats in IoT devices. Botnet attacks have more severe and common attacks and it is threaten IoT devices. These threats interrupt IoT alteration by interrupting networks and services for IoT devices. Several existing methods present themselves to determine unknown patterns in IoT networks for improving security. Recent analysis presents DL and ML methods for classifying and detecting botnet attacks from the IoT environment. Consequently, this paper develops a Bald Eagle Search Optimization with a Hybrid Deep Learning based botnet detection (BESO-HDLBD) algorithm in an IoT platform. The presented BESO-HDLBD approach aims to resolve the security issue by identifying the botnets in the IoT environment. To reduce the high dimensionality problem, the BESO-HDLBD method uses the BESO system for the feature selection process. For botnet detection purposes, the BESO-HDLBD algorithm uses HDL, which is an integration of convolutional neural networks (CNNs), bidirectional long short-term memory (BiLSTM), and attention concept. The desire for the HDL technique in botnet detection utilises the intricate nature of botnet attacks that frequently contain difficult and developing patterns. Combining CNNs permits for effectual feature extraction from spatial data, BiLSTM networks capture temporal dependencies, and attention mechanisms improve the model’s capability to concentrate on fundamental patterns. The selection of hyperparameters of the HDL approach takes place using the dragonfly algorithm (DFA). The experimental analysis of the BESO-HDLBD system could be examined under a benchmark botnet dataset. The obtained outcome infers a better outcome of the BESO-HDLBD technique compared to the recent detection system with respect to distinct estimation measures

    SARS-CoV-2 vaccination modelling for safe surgery to save lives: data from an international prospective cohort study

    No full text
    Background: Preoperative SARS-CoV-2 vaccination could support safer elective surgery. Vaccine numbers are limited so this study aimed to inform their prioritization by modelling. Methods: The primary outcome was the number needed to vaccinate (NNV) to prevent one COVID-19-related death in 1 year. NNVs were based on postoperative SARS-CoV-2 rates and mortality in an international cohort study (surgical patients), and community SARS-CoV-2 incidence and case fatality data (general population). NNV estimates were stratified by age (18-49, 50-69, 70 or more years) and type of surgery. Best- and worst-case scenarios were used to describe uncertainty. Results: NNVs were more favourable in surgical patients than the general population. The most favourable NNVs were in patients aged 70 years or more needing cancer surgery (351; best case 196, worst case 816) or non-cancer surgery (733; best case 407, worst case 1664). Both exceeded the NNV in the general population (1840; best case 1196, worst case 3066). NNVs for surgical patients remained favourable at a range of SARS-CoV-2 incidence rates in sensitivity analysis modelling. Globally, prioritizing preoperative vaccination of patients needing elective surgery ahead of the general population could prevent an additional 58 687 (best case 115 007, worst case 20 177) COVID-19-related deaths in 1 year. Conclusion: As global roll out of SARS-CoV-2 vaccination proceeds, patients needing elective surgery should be prioritized ahead of the general population
    corecore