Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2074
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lokuketagoda, B | - |
dc.contributor.author | Weerakoon, M. P | - |
dc.contributor.author | Kuruppu, M. U | - |
dc.contributor.author | Senarathne, A. N | - |
dc.contributor.author | Abeywardena, K. Y | - |
dc.date.accessioned | 2022-04-26T09:01:34Z | - |
dc.date.available | 2022-04-26T09:01:34Z | - |
dc.date.issued | 2018-08-08 | - |
dc.identifier.citation | B. Lokuketagoda, M. P. Weerakoon, U. M. Kuruppu, A. N. Senarathne and K. Yapa Abeywardena, "R - Killer: An Email Based Ransomware Protection Tool," 2018 13th International Conference on Computer Science & Education (ICCSE), 2018, pp. 1-7, doi: 10.1109/ICCSE.2018.8468807. | en_US |
dc.identifier.issn | 2473-9464 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2074 | - |
dc.description.abstract | Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user's data to public threat intelligence services, hence protecting the confidentiality of user data. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2018 13th International Conference on Computer Science & Education (ICCSE);Pages 1-7 | - |
dc.subject | Email Based | en_US |
dc.subject | Ransomware | en_US |
dc.subject | Protection Tool | en_US |
dc.subject | R - Killer | en_US |
dc.title | R-Killer: An email based ransomware protection tool | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICCSE.2018.8468807 | en_US |
Appears in Collections: | Department of Computer Systems Engineering-Scopes Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
R_-_Killer_An_Email_Based_Ransomware_Protection_Tool.pdf Until 2050-12-31 | 5.15 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.