Analysis Of The Development Of An Early Detection System For Cryptographic-Based Ransomware Attacks In A Cloud Environment

Saved in:
Bibliographic Details
Title: Analysis Of The Development Of An Early Detection System For Cryptographic-Based Ransomware Attacks In A Cloud Environment
Authors: hartono, Bryan, Zaejuli, Hamdoni
Source: Jurnal Impresi Indonesia; Vol. 4 No. 1 (2025): Indonesian Impression Journal (JII); 996-1002 ; 2810-062X ; 2828-1284 ; 10.58344/jii.v4i1
Publisher Information: Riviera Publishing
Publication Year: 2025
Subject Terms: Early detection of ransomware, cryptography for data security, AES algorithm on the cloud, cloud computing security, Ransomware Attack Mitigation
Subject Geographic: National
Description: In the digital era, ransomware attacks have become a significant threat to security systems, especially in cloud computing environments. These attacks encrypt victim data and demand ransom, causing considerable financial and operational losses. This Study aims to develop a cryptography-based early detection system for ransomware attacks to protect data in cloud environments. Using the Systematic Literature Review (SLR) approach, this Study analyzes literature related to ransomware attacks, cryptographic algorithms, and cloud security. Data are obtained from indexed journals, books, and conferences. The Study's results showed that the implementation of cryptographic algorithms, such as Advanced Encryption Standard (AES), can improve the efficiency and effectiveness of ransomware detection. This system managed to reduce detection time by 48.28%, increase the success rate of data protection from 60% to 95%, and almost double the amount of data protected. This implementation strengthens data security, minimizes the impact of ransomware, and ensures the continuity of cloud user operations. The implications of this Study support the existing literature on the importance of cryptography in mitigating digital security threats while providing practical guidance for organizations in adopting this technology. Further research is recommended to integrate cryptographic algorithms with technologies such as blockchain to increase the scale and complexity of data protection in a broader cloud environment.
Document Type: article in journal/newspaper
File Description: application/pdf
Language: English
Relation: https://jii.rivierapublishing.id/index.php/jii/article/view/6188/848; https://jii.rivierapublishing.id/index.php/jii/article/view/6188/849; https://jii.rivierapublishing.id/index.php/jii/article/view/6188
DOI: 10.58344/jii.v4i1.6188
Availability: https://jii.rivierapublishing.id/index.php/jii/article/view/6188
https://doi.org/10.58344/jii.v4i1.6188
Rights: Copyright (c) 2025 Bryan hartono, Hamdoni Zaejuli ; https://creativecommons.org/licenses/by-sa/4.0
Accession Number: edsbas.1B442559
Database: BASE
Be the first to leave a comment!
You must be logged in first