scholarly journals A Proposed Methodology to Mitigate the Ransomware Attack

2021 ◽  
Author(s):  
Salunke M. D ◽  
Kumbharkar P. B ◽  
Pramod Kumar

Now a day’s network security becomes more important to organizations, government offices. With the fast advancement of the innovation, assaults throughout the years have turned out to be both progressively various and modern. Ransomware attack becomes one of the most popular weapons for network attackers that ransomware attack is increased rapidly year by year. The study shows that the ransomware attack is one of the top attacks that are most attacked malware by the attackers. In this paper, we focus on mitigation techniques that can be used to recover and mitigate the ransomware attack. The mitigation or recovery approach is very difficult as ransomware is depending upon cryptographic algorithms which are very difficult to crack.

Author(s):  
Kritika Acharya ◽  
Manisha Sajwan ◽  
Sanjay Bhargava

Author(s):  
Vijay Gokul Koli ◽  
Raj Kumar Paul

Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. Massage communication over internet facing problems like data security, copyright control, data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by wishing to remove the embedded data after data receiving with the help of image pixel color value.


Author(s):  
P. SAVEETHA ◽  
S. ARUMUGAM

The Network Security means to protect data during their transmission over channel of networks similarly Internet Security also to protect data during their transmission over a collection of interconnected networks in all over the world. Cryptography is the way of hiding information during transmission over a cannel. There are lots of cryptographic algorithms available to protect our data from intruders.RSA also one of effective the public key cryptographic algorithm which needs time and memory. Many research papers submitted on this cryptographic algorithm. Each paper has different perspective.


Strength of the network security usually depends on the weakness of the link, which is the concept lies in the implementation of cryptographic algorithms. In this paper, we deal with the implementation of RSA algorithm using Chinese remainder theorem.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Ximin Yang ◽  
Deqiang Wang ◽  
Wei Feng ◽  
Jingjing Wu ◽  
Wan Tang

IPsec was initially developed for IPv6 to ensure the communication security. With the development of Internet of Things (IoT) and the mounting importance of network security, increasing numbers of applications require IPsec to support the customized definition of cryptographic algorithms and to provide flexible invocation of these algorithms. To address this issue, an invocation mechanism for cryptographic algorithms is proposed in this paper and applied to IPsec, entitled Free to Add (FTA), based on the concept of software-defined everything. Using the idea of interface opening, the addition of a new cryptographic algorithm and updating of the existing algorithms in the algorithm library both can be achieved through the opening interfaces provided by FTA. Switching the cryptographic algorithm to be used in the FTA framework can avoid the unnecessary consumption. Besides, using the subalgorithm interface and algorithm-control interface designed here, FTA provides several software-defined invocation modes (e.g., combination and switching according to the control instruction sent by the control program) to implement hybrid encryptions or change the cryptographic algorithms for communication. Finally, the feasibility and availability of the proposed FTA mechanism are evaluated by StrongSwan.


2020 ◽  
Vol 4 (1) ◽  
pp. 1-12
Author(s):  
Elizabeth C. Lopardo ◽  
Clare M. Ryan

Four dams on the lower Snake River in Washington State generate hydropower and allow for regional agriculture and barge shipping to Portland OR. However, the dams impede the migration of local salmon populations (Oncorhynchus spp.), which are in steep decline, and drastically impact the populations of salmon and orca whales, for whom salmon are a primary food source. For years, environmental groups have argued for breaching the dams; other interests counter that the dams are too critical to the economy of the region to lose; and federal agencies assert that the dams can remain and salmon populations will recover with mitigation techniques. Scientific and economic analyses, litigation, and elected officials’ efforts have not been able to move the issue towards a solution. Readers will examine the interests of primary actors in the issue, how they influence the policy process, the role of scientific and economic analyses, and possible approaches for resolving the issue.


Sign in / Sign up

Export Citation Format

Share Document