Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

A Survey on Ransomware Threats: Contrasting Static and Dynamic Analysis Methods

Version 1 : Received: 12 November 2023 / Approved: 13 November 2023 / Online: 13 November 2023 (10:09:49 CET)

How to cite: Kang, Q.; Gu, Y. A Survey on Ransomware Threats: Contrasting Static and Dynamic Analysis Methods. Preprints 2023, 2023110798. https://doi.org/10.20944/preprints202311.0798.v1 Kang, Q.; Gu, Y. A Survey on Ransomware Threats: Contrasting Static and Dynamic Analysis Methods. Preprints 2023, 2023110798. https://doi.org/10.20944/preprints202311.0798.v1

Abstract

The proliferation of ransomware poses a significant threat to global cybersecurity. This study presents a comprehensive review of the methodologies employed in the detection and analysis of ransomware, emphasizing the dichotomy between static and dynamic analysis approaches. It introduces the historical context and the necessity for robust cybersecurity measures, followed by an outline of the methodological framework used to evaluate existing ransomware analysis techniques. The results detail the effectiveness and limitations of various analysis strategies, identifying key features and patterns that aid in the detection and classification of ransomware threats. The study concludes by summarizing the primary achievements, including the identification of gaps in current research and proposing future research directions aimed at enhancing ransomware detection and mitigation strategies. The synthesis provided in this survey offers a consolidated view of the state-of-the-art in ransomware threat analysis and serves as a resource for cybersecurity professionals and researchers.

Keywords

ransomware detection; static analysis; dynamic analysis; cybersecurity; threat mitigation

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.