Ransomware Attacks Threat Modeling Using Bayesian Network
نویسندگان
چکیده
Ransomware is a dangerous malware that blocks access to data through encryption, and it exploits device vulnerabilities perform chain attacks from one system another. This study results in modeling the threat of ransomware using Bayesian Network. The structure model created can be exploited. As basis for calculating probability model, EPSS vulnerability score used. risk exposure rating calculated joint distribution formulation based on attack scenarios. Our shows are most likely exploit CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-36942, CVE-2017-0144 which has value 0.046534. In addition, use also makes assessment more factual, accurate, effective. method help identifying vulnerabilities, making precise.
منابع مشابه
Using ILP to Analyse Ransomware Attacks
This paper describes a preliminary study aimed at using the ILP system ALEPH to interactively assist human experts in learning rules to better understand the behaviour of cyberattacks. We develop an ILP formalism for representing network log data obtained from a sandbox computer that was deliberately infected with the CryptoWall-4 malware (a state-of-the-art ransomware attack known to be causin...
متن کاملEvolving Threat Agents: Ransomware and their Variants
This paper studies different kinds of ransomware attacks right from its point of origin to the latest kind of ransomware attacks. As this malware threat has reported a significant increase in the number of report incidents happenings in countries like USA, UK and India. A study of its evolution provides for its first line of defense. So the paper offers an awareness of different kinds of ransom...
متن کاملNetwork Threat Modeling
Threat Modeling Threat modeling is an important risk assessment and mitigation practice that provides the capability to secure a network environment. Threat modeling includes understanding and communicating the threats to the network computing environment. It is critical to be aware of the types of threats and how to reduce or mitigate the risk both in systems and applications on network aware ...
متن کاملscour modeling piles of kambuzia industrial city bridge using hec-ras and artificial neural network
today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...
Ransomware attacks: detection, prevention and cure
The notion of ransomware has actually been around for quite some time. In 1989, Dr Joseph Popp distributed a trojan called PC Cyborg in which malware would hide all folders and encrypt files on the PC’s C: drive. A script delivered a ransom message demanding that $189 be directed to the PC Cyborg Corporation. The afflicted PC wouldn’t function until the ransom was paid and the malware’s actions...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
سال: 2023
ISSN: ['2477-3255', '2086-4884']
DOI: https://doi.org/10.31849/digitalzone.v14i1.13788