Ransomware Attacks Threat Modeling Using Bayesian Network

نویسندگان

چکیده

Ransomware is a dangerous malware that blocks access to data through encryption, and it exploits device vulnerabilities perform chain attacks from one system another. This study results in modeling the threat of ransomware using Bayesian Network. The structure model created can be exploited. As basis for calculating probability model, EPSS vulnerability score used. risk exposure rating calculated joint distribution formulation based on attack scenarios. Our shows are most likely exploit CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-36942, CVE-2017-0144 which has value 0.046534. In addition, use also makes assessment more factual, accurate, effective. method help identifying vulnerabilities, making precise.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using ILP to Analyse Ransomware Attacks

This paper describes a preliminary study aimed at using the ILP system ALEPH to interactively assist human experts in learning rules to better understand the behaviour of cyberattacks. We develop an ILP formalism for representing network log data obtained from a sandbox computer that was deliberately infected with the CryptoWall-4 malware (a state-of-the-art ransomware attack known to be causin...

متن کامل

Evolving Threat Agents: Ransomware and their Variants

This paper studies different kinds of ransomware attacks right from its point of origin to the latest kind of ransomware attacks. As this malware threat has reported a significant increase in the number of report incidents happenings in countries like USA, UK and India. A study of its evolution provides for its first line of defense. So the paper offers an awareness of different kinds of ransom...

متن کامل

Network Threat Modeling

Threat Modeling Threat modeling is an important risk assessment and mitigation practice that provides the capability to secure a network environment. Threat modeling includes understanding and communicating the threats to the network computing environment. It is critical to be aware of the types of threats and how to reduce or mitigate the risk both in systems and applications on network aware ...

متن کامل

scour modeling piles of kambuzia industrial city bridge using hec-ras and artificial neural network

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

Ransomware attacks: detection, prevention and cure

The notion of ransomware has actually been around for quite some time. In 1989, Dr Joseph Popp distributed a trojan called PC Cyborg in which malware would hide all folders and encrypt files on the PC’s C: drive. A script delivered a ransom message demanding that $189 be directed to the PC Cyborg Corporation. The afflicted PC wouldn’t function until the ransom was paid and the malware’s actions...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Zone: Jurnal Teknologi Informasi dan Komunikasi

سال: 2023

ISSN: ['2477-3255', '2086-4884']

DOI: https://doi.org/10.31849/digitalzone.v14i1.13788