CALL FOR PAPERS

CERTIFICATE

IMPACT FACTOR 2019

Subject Area

  • Life Sciences / Biology
  • Architecture / Building Management
  • Asian Studies
  • Business & Management
  • Chemistry
  • Computer Science
  • Economics & Finance
  • Engineering / Acoustics
  • Environmental Science
  • Agricultural Sciences
  • Pharmaceutical Sciences
  • General Sciences
  • Materials Science
  • Mathematics
  • Medicine
  • Nanotechnology & Nanoscience
  • Nonlinear Science
  • Chaos & Dynamical Systems
  • Physics
  • Social Sciences & Humanities

Why Us? >>

  • Open Access
  • Peer Reviewed
  • Rapid Publication
  • Life time hosting
  • Free promotion service
  • Free indexing service
  • More citations
  • Search engine friendly

Plagiarism Detection

IJCR is following an instant policy on rejection those received papers with plagiarism rate of more than 20%. So, All of authors and contributors must check their papers before submission to making assurance of following our anti-plagiarism policies.

 

 

 

 

 

 

 

 

 

 

 

 

Ransomware attack detection and prevention

Author: 
Lama Alhathally and Emad Alsuwat
Subject Area: 
Physical Sciences and Engineering
Abstract: 

Nowadays, quite a lot of users became victims of cyberattacks campaigns especially those that depend on holding a document to get a ransom. In other words, users tend to save their vital documents on computers or on the cloud which makes these documents exposed to adversarial attackers. Ransomware is an emerging cyberattack and one of the toughest kinds of scareware to fight against. Moreover, it’s not feasible to detect ransomware attacks with classical methods because suck attacks are evolving and reforming very quickly which makes it hard for antiviruses to detect such threats. There are three detection methods that can accurately detect this emerging attack. These detection methods are based on classifying and analyzing network traffic to extract abnormal behavior and thus detect ransomware. Moreover, it is possible to use machine learning techniques to erect a model for detecting this attack. Using honeypot to deceive the ransom ware and discover it a faster method for detecting ransomware attacks. There are effective preventing methods that can thwart this attack from happening, such as making an up-to-date backup and avoiding clicking on untrusted email links and attachments.

PDF file: 

IJMCE RECOMMENDATION

ONLINE PAYPAL PAYMENT

CURRENT ISSUE

NEWS

CHIEF EDITOR
Rosane Cavalcante Fragoso, Brasil
ASSOCIATE CHIEF EDITOR

   

Jean-Marc SABATIER
Chief Scientific Officer and Head of a Research Group
France

Advantages of IJCR

  • Rapid Publishing
  • Professional publishing practices
  • Indexing in leading database
  • High level of citation
  • High Qualitiy reader base
  • High level author suport

 

 

 

 

 

 

 

 

 

 

 

EDITORIAL BOARD

Luai Farhan Zghair
Iraq
Hasan Ali Abed Al-Zu’bi
Jordanian
Fredrick OJIJA
Tanzanian
Firuza M. Tursunkhodjaeva
Uzbekistan
Faraz Ahmed Farooqi
Saudi Arabia
Eric Randy Reyes Politud
Philippines
Elsadig Gasoom FadelAlla Elbashir
Sudan
Eapen, Asha Sarah
United State
Dr.Arun Kumar A
India
Dr. Zafar Iqbal
Pakistan
Dr. SHAHERA S.PATEL
India
Dr. Ruchika Khanna
India
Dr. Recep TAS
Turkey
Dr. Rasha Ali Eldeeb
Egypt
Dr. Pralhad Kanhaiyalal Rahangdale
India
DR. PATRICK D. CERNA
Philippines
Dr. Nicolas Padilla- Raygoza
Mexico
Dr. Mustafa Y. G. Younis
Libiya
Dr. Muhammad shoaib Ahmedani
Saudi Arabia
DR. MUHAMMAD ISMAIL MOHMAND
United State
DR. MAHESH SHIVAJI CHAVAN
India
DR. M. ARUNA
India
Dr. Lim Gee Nee
Malaysia
Dr. Jatinder Pal Singh Chawla
India
DR. IRAM BOKHARI
Pakistan
Dr. FARHAT NAZ RAHMAN
Pakistan
Dr. Devendra kumar Gupta
India
Dr. ASHWANI KUMAR DUBEY
India
Dr. Ali Seidi
Iran
Dr. Achmad Choerudin
Indonesia
Dr Ashok Kumar Verma
India
Thi Mong Diep NGUYEN
France
Dr. Muhammad Akram
Pakistan
Dr. Imran Azad
Oman
Dr. Meenakshi Malik
India
Aseel Hadi Hamzah
Iraq
Anam Bhatti
Malaysia
Md. Amir Hossain
Bangladesh
Ahmet İPEKÇİ
Turkey
Mirzadi Gohari
Iran