Analysis Of The Development Of An Early Detection System For Cryptographic-Based Ransomware Attacks In A Cloud Environment
Saved in:
| Title: | Analysis Of The Development Of An Early Detection System For Cryptographic-Based Ransomware Attacks In A Cloud Environment |
|---|---|
| Authors: | hartono, Bryan, Zaejuli, Hamdoni |
| Source: | Jurnal Impresi Indonesia; Vol. 4 No. 1 (2025): Indonesian Impression Journal (JII); 996-1002 ; 2810-062X ; 2828-1284 ; 10.58344/jii.v4i1 |
| Publisher Information: | Riviera Publishing |
| Publication Year: | 2025 |
| Subject Terms: | Early detection of ransomware, cryptography for data security, AES algorithm on the cloud, cloud computing security, Ransomware Attack Mitigation |
| Subject Geographic: | National |
| Description: | In the digital era, ransomware attacks have become a significant threat to security systems, especially in cloud computing environments. These attacks encrypt victim data and demand ransom, causing considerable financial and operational losses. This Study aims to develop a cryptography-based early detection system for ransomware attacks to protect data in cloud environments. Using the Systematic Literature Review (SLR) approach, this Study analyzes literature related to ransomware attacks, cryptographic algorithms, and cloud security. Data are obtained from indexed journals, books, and conferences. The Study's results showed that the implementation of cryptographic algorithms, such as Advanced Encryption Standard (AES), can improve the efficiency and effectiveness of ransomware detection. This system managed to reduce detection time by 48.28%, increase the success rate of data protection from 60% to 95%, and almost double the amount of data protected. This implementation strengthens data security, minimizes the impact of ransomware, and ensures the continuity of cloud user operations. The implications of this Study support the existing literature on the importance of cryptography in mitigating digital security threats while providing practical guidance for organizations in adopting this technology. Further research is recommended to integrate cryptographic algorithms with technologies such as blockchain to increase the scale and complexity of data protection in a broader cloud environment. |
| Document Type: | article in journal/newspaper |
| File Description: | application/pdf |
| Language: | English |
| Relation: | https://jii.rivierapublishing.id/index.php/jii/article/view/6188/848; https://jii.rivierapublishing.id/index.php/jii/article/view/6188/849; https://jii.rivierapublishing.id/index.php/jii/article/view/6188 |
| DOI: | 10.58344/jii.v4i1.6188 |
| Availability: | https://jii.rivierapublishing.id/index.php/jii/article/view/6188 https://doi.org/10.58344/jii.v4i1.6188 |
| Rights: | Copyright (c) 2025 Bryan hartono, Hamdoni Zaejuli ; https://creativecommons.org/licenses/by-sa/4.0 |
| Accession Number: | edsbas.1B442559 |
| Database: | BASE |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science