Mitigating Ransomware Attacks: K.Jaisharma, Suvvala Manoj, K. Manideep, Manoj Kumar Reddy
Mitigating Ransomware Attacks: K.Jaisharma, Suvvala Manoj, K. Manideep, Manoj Kumar Reddy
Mitigating Ransomware Attacks: K.Jaisharma, Suvvala Manoj, K. Manideep, Manoj Kumar Reddy
Published By:
Retrieval Number: I11430789S419/19©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijitee.I1143.0789S419 260 & Sciences Publication
Mitigating Ransomware Attacks
Tools Year of
Full Form Applicable of OS Usage
Name publish
Published By:
Retrieval Number: I11430789S419/19©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijitee.I1143.0789S419
261 & Sciences Publication
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-8, Issue-9S4, July 2019
3. Work as well as the network segmentation is very Address Space Layout Randomization - A feature that
important to get rid off the ransomware attacks since it partially randomizes address space from buffer overflow
will provide the organisation with good communication attacks.
between employees in segments wise as well as network No execute technology - another protection features for
wise. specifying areas of memory that cannot be used for
4. Improving of strong password policies which can’t be execution.
revealed anywhere within the organization as well as the
outside of the organisation. IV. IMPLEMENTATION AND RESULTS
5. Disabling of some important web services and other
The implementation of proposed solution is typically
websites to avoid those kind of attacks like ransomware.
difficult but by ensuring the above solutions to survive from
Windows Defender - Once the threats are found then the ransomware attack we can able implement to get
there is no need of Windows real-time protection analysing, survived from the tremendous cyber-attacks.
and blocking. Implementation of those suggestions in the real time
Windows Firewall – Even though it may identify a scenario is as follows;
testing environment, some malicious codes are demonstrated 1. Windows defender.
when we activate the firewall in the system or computer. 2. Windows Firewall.
Windows Update – New updates may modify our 3. Windows update
configuration and may give an additional protection to the 4. System backup rapidly.
system. After implementing those kinds of solutions we could see
the following drastic changes like how the organisations
have been survived from the cyber-attacks like ransomware.
120
100
80
60 no of attacks
40 decreased per month
20
0
Jan Feb Mar Apr May Jun Jul
Months
Published By:
Retrieval Number: I11430789S419/19©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijitee.I1143.0789S419 262 & Sciences Publication
Mitigating Ransomware Attacks
Published By:
Retrieval Number: I11430789S419/19©BEIESP Blue Eyes Intelligence Engineering
DOI:10.35940/ijitee.I1143.0789S419
263 & Sciences Publication