期刊名称:International Journal of Computer Trends and Technology
电子版ISSN:2231-2803
出版年度:2013
卷号:4
期号:5-2
出版社:Seventh Sense Research Group
摘要:As we know that traditionally, "Cryptography" is used for information processing and communications, it helps people to store information securely and it is used very frequently for private communications. but Cryptovirology is the study of applications of cryptography to build the malicious software (malware). It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and improve new malware attacks. This is a forward engineering discipline that can be used for attacking rather than defending. In this paper we present the clear process of “how the crypto virus can damage the victim’s system, based on Extortion mechanism” with showing the live scenario that causes the loss of access to information, loss of control and loss of money also. Here we discuss and explain some of the latest events regarding to this cryproviral extortion like GPcode and Conflicker. This paper also suggests some of the countermeasures, mechanisms to defend and prevent such attacks. Even if the attacker’s actions on the host machine are being monitored, it cannot be controlled the host system completely. By knowing that the exact scenario what exactly hacker follow to spoil our system or network using this cryptoviral Extortion method .we can anticipate or guesses the opponent's or attackers next move and can able to provide some of the safe guards initially.