Analysis Of The Development Of An Early Detection System For Cryptographic-Based Ransomware Attacks In A Cloud Environment
Main Article Content
In the digital era, ransomware attacks have become a significant threat to security systems, especially in cloud computing environments. These attacks encrypt victim data and demand ransom, causing considerable financial and operational losses. This Study aims to develop a cryptography-based early detection system for ransomware attacks to protect data in cloud environments. Using the Systematic Literature Review (SLR) approach, this Study analyzes literature related to ransomware attacks, cryptographic algorithms, and cloud security. Data are obtained from indexed journals, books, and conferences.
The Study's results showed that the implementation of cryptographic algorithms, such as Advanced Encryption Standard (AES), can improve the efficiency and effectiveness of ransomware detection. This system managed to reduce detection time by 48.28%, increase the success rate of data protection from 60% to 95%, and almost double the amount of data protected. This implementation strengthens data security, minimizes the impact of ransomware, and ensures the continuity of cloud user operations. The implications of this Study support the existing literature on the importance of cryptography in mitigating digital security threats while providing practical guidance for organizations in adopting this technology. Further research is recommended to integrate cryptographic algorithms with technologies such as blockchain to increase the scale and complexity of data protection in a broader cloud environment.
Ahmed, M., Qureshi, A., Shamsi, J. A., & Marvi, M. (2022). Sequential Embedding-based Attentive (SEA) classifier for malware classification. 2022 International Conference on Cyber Warfare and Security (ICCWS), 28. DOI:10.48550/arXiv.2302.05728
Akbar, MZ (2023). Analysis Mathematical To Data Security in System Modern Cryptography. Journal of World Science, 3(7).
Bahrani, A., & Bidgly, A. J. (2019). Ransomware detection using process mining and classification algorithms. 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), 73. DOI:10.1109/ISCISC48546.2019.8985149
Begovic, K., Al-Ali, A., & Malluhi, Q. (2023). Cryptographic ransomware encryption detection: Survey. arXiv preprint arXiv:2306.12008. https://doi.org/10.1016/j.cose.2023.103349
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Bandic, I.: Cloud computing and emerging IT platforms: vision, hype, and relatability. For give computing as 5th utility. System Computer Future Generations 25( 6 ), 599–616 (2009). DOI:10.1016/j.future .2008.12.001
E. Suhartono, "Systematic Literature Review (SLR): Methods, Benefits, and Challenges of Learning Analysis with Data Mining Methods in Higher Education," J. Ilm. INFOKAM, vol. 13, no. 1, pp. 73–86, 2017.
F. Rozi, “A Systematic Literature Review on Predictive Analytics with IoT: Research Trends, Methods, and Architectures,” J. Syst. Intelligent, vol. 3, no. 1, pp. 43–53, 2020. DOI: https://doi.org/10.37396/jsc.v3i1.53
Gorecki, A. (2020). Cyber Breach Response That Actually Works. Wiley.
Hasanzahrawi , I. (2024). Ransomware in the Digital Age: Detection, Mitigation, and Recovery Strategies.
I. Dan, T. Intech, I. Sulistiani, E. Mufida, P. M. Yasser, and L. Alamsyah, "Systematic Literature Review: Bankruptcy Prediction Using Machine Learning and Deep Learning Techniques," vol. 2, no. 1, pp. 13–18, 2021. DOI: https://doi.org/10.54895/intech.v2i1.824
Karima, NA, Aisyah, AN, Silla, HV, Handoko, LB, & Sani, RR (2024). Text-Based Cryptography Algorithm Substitution Vigenere Cipher 8 Bit. Journal of Informatics Society, 15(1), 1-13. https://doi.org/10.14710/jmasif.15.1.60836
L. Iffländer, A. Dmitrienko, C. Hagen, M. Jobst, and S. Kounev, “Leave My Database: Ransomware Detection in Databases via Dynamic Analysis Order Queries," 2019. DOI:10.48550/arXiv.1907.06775
Melaragno, A., & Casey, W. (2022). Change Point Detection with Machine Learning for Rapid Ransomware Detection. 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/ PiCom / CBDCom / CyberSciTech ), 1. DOI:10.1109/DASC/ PiCom / CBDCom /Cy55231.2022.9927828
Oktavani, S. (2023). Analysis of data security using modern cryptography and advanced encryption standard (AES) algorithm. Journal of Informatics Media, 4(2), 97-101. DOI: https://doi.org/10.55338/jumin.v4i2.435
P. Mell and T. Grance, “NIST Definition of Cloud Computing,” National Institute of Standards and Technology Special Publication 800-145, Department of Trade, Gaithersburg, 2011. https://doi.org/10.6028/NIST.SP.800-145
Pradani, S. (2024). Deep Learning Approach to Detection Anomaly in Cyber Security. Journal Smart Technology, 4(1).
S. Bhattacharya and CRS Kumar, “Ransomware: CryptoVirus subverts cloud security,” 2017 Int. Conf. Algorithms, Methodol. Types. Appl. Tech. ICAMMAET 2017, vol. 2017-January, pp. 1–6, 2017.
Sari, DP, Halim, Z., Irlon, Wases, B., & Saromah. (2024). Implementation of Machine Learning for Detection Network Intrusion Computer. Journal Information Polgan , 13(2), 1389-1391. DOI: 10.33395/ jmp.v 13i2.14074
Setiadi, T., Yustrisia , L., Irawan, A. Ch., Kaaffah , FM, Safii , M., Prananingrum , L., Saputro , IA, & Diponegoro , M. (2024). System Cyber Security Information. CV. Gita Lentera.
Song, W., Karanam, S., Xiao, Y., Qi, J., Dautenhahn, N., Meng, N., Ferrari, E., & Yao, D. (2023). Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. arXiv preprint arXiv:2306.02270. https://doi.org/10.48550/arXiv.2306.02270
Suhartono , E. (2017). Research Methods Systematic in Security Information.
Urooj, U., Al-Rimy, B.A.S., Zainal, A.B., Saeed, F., Abdelmaboud, A., & Nagmeldin, W. (2024). Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks. IEEE Access, 12, 3910. DOI:10.1109/ACCESS.2023.3348451
Urooj, U., Al-Rimy, BAS, Zainal, A., & Rassam, F.A. (2021). Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions. Applied Sciences, 12(1), 172. https://doi.org/10.3390/app12010172
Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security (6th ed.). Cengage Learning.
Yang, C.-Y., & Sahita, R. (2020). Towards a Resilient Machine Learning Classifier -- a Case Study of Ransomware Detection. arXiv preprint arXiv:2003.06428. https://doi.org/10.48550/arXiv.2003.06428