Systematic Literature Review Serangan Ransomware: Metode Penyerangan dan Mekanisme Pertahanan
Keywords:
Ransomware, Cybersecurity, Systematic Literature ReviewAbstract
Ransomware tetap menjadi ancaman serius di dunia keamanan siber, memanfaatkan teknik canggih untuk membobol dan mengenkripsi data untuk mendapatkan keuntungan finansial. Studi ini menggunakan metodologi Systematic Literature Review (SLR) untuk menganalisis pola serangan ransomware dan mengevaluasi efektivitas mekanisme pertahanan yang didokumentasikan dalam penelitian terbaru. Tinjauan ini mengidentifikasi vektor serangan umum, termasuk phishing dan eksploitasi kerentanan perangkat lunak, serta mengeksplorasi pendekatan mitigasi seperti strategi cadangan, segmentasi jaringan, dan kesadaran pengguna. Dengan mensintesis temuan dari 30 studi utama, penelitian ini memberikan pemahaman komprehensif tentang siklus hidup serangan ransomware dan menyoroti strategi pertahanan praktis bagi organisasi dan individu. Studi ini diakhiri dengan wawasan kunci untuk meningkatkan ketahanan terhadap ancaman siber yang persisten ini.
Downloads
References
A. H. Mohammad, “Ransomware Evolution, Growth and Recommendation for Detection,” Mod Appl Sci, vol. 14, no. 3, p. 68, Feb. 2020, doi: 10.5539/mas.v14n3p68.
A. Vehabovic, N. Ghani, E. Bou-Harb, J. Crichigno, and A. Yayimli, “Ransomware Detection and Classification Strategies,” Apr. 2023, doi: 10.1109/BlackSeaCom54372.2022.9858296.
Z. Manjezi and R. A. Botha, “Preventing and Mitigating Ransomware: A Systematic Literature Review,” in Communications in Computer and Information Science, Springer Verlag, 2019, pp. 149–162. doi: 10.1007/978-3-030-11407-7_11.
S. Razaulla et al., “The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions,” IEEE Access, vol. 11, pp. 40698–40723, 2023, doi: 10.1109/ACCESS.2023.3268535.
I. A. Chesti, M. Humayun, N. U. Sama, and N. Z. Jhanjhi, “Evolution, Mitigation, and Prevention of Ransomware,” in 2020 2nd International Conference on Computer and Information Sciences, ICCIS 2020, Institute of Electrical and Electronics Engineers Inc., Oct. 2020. doi: 10.1109/ICCIS49240.2020.9257708.
S. Haque, Z. Eberhart, A. Bansal, and C. McMillan, “A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions,” in IEEE International Conference on Program Comprehension, IEEE Computer Society, 2022, pp. 36–47. doi: 10.1145/nnnnnnn.nnnnnnn.
Z. Manjezi and R. A. Botha, “Preventing and Mitigating Ransomware: A Systematic Literature Review,” in Communications in Computer and Information Science, Springer Verlag, 2019, pp. 149–162. doi: 10.1007/978-3-030-11407-7_11.
A. Vehabovic, N. Ghani, E. Bou-Harb, J. Crichigno, and A. Yayimli, “Ransomware Detection and Classification Strategies,” Apr. 2023, doi: 10.1109/BlackSeaCom54372.2022.9858296.
A. M. Maigida, S. M. Abdulhamid, M. Olalere, J. K. Alhassan, H. Chiroma, and E. G. Dada, “Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms,” Jul. 01, 2019, Springer Science and Business Media Deutschland GmbH. doi: 10.1007/s40860-019-00080-3.
A. Sainuri Mubarak, M. Nur Insirat, M. Nurul Lutfiya, S. Negeri, U. Muhammadiyah Makassar, and U. Negeri Makassar, “SNESTIK Seminar Nasional Teknik Elektro, Sistem Informasi, dan Teknik Informatika Ransomware: Evolution, Classification, Attack Phase, Detection and Prevention”, doi: 10.31284/p.snestik.2024.5588.
S. G. Selvaganapathy, S. Sadasivam, and V. Ravi, “A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead,” Journal of Cyber Security and Mobility, vol. 10, no. 1, pp. 177–230, 2021, doi: 10.13052/jcsm2245-1439.1017.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Jaswin, Yonky Pernando (Author)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.