학술논문

Zero Trust Resilience Strategy for Linux Crypto Ransomware Obviation and Recuperation
Document Type
Conference
Source
2023 3rd International Conference on Intelligent Technologies (CONIT) Intelligent Technologies (CONIT), 2023 3rd International Conference on. :1-7 Jun, 2023
Subject
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Fields, Waves and Electromagnetics
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Linux
Operating systems
Government
Microcomputers
Zero Trust
Critical infrastructure
Ransomware
crypto-ransomware
zero trust
Linux ransomware
cyber security
crypto warfare
cyber-attack
malware
Language
Abstract
The utilization of crypto ransomware has emerged as a potent and progressively perilous armament in the cyber criminal’s repertoire, inflicting severe and extensive damages on both individuals and enterprises. Despite the conventional view of Windows-based systems as the most targeted by ransomware attacks, there has been a noticeable shift in focus towards Linux-based systems, posing a new security challenge. Linux, a widely adopted open-source operating system renowned for its robust security and dependability, has been particularly favored by critical infrastructures, government entities, and commercial enterprises. Nevertheless, the recent emergence of ransomware targeting Linux systems has exposed the platform's susceptibility to cyber threats, leading to heightened concerns about the security of these systems. This research article proposes a zero-trust resilience strategy (ZTRS) for Linux based servers and personal computers to effectively mitigate the latest crypto ransomware variants including Hive, Conti, Darkside, REvil and Red Alert. ZTRS adopts a comprehensive and advanced strategy that has been carefully designed to efficiently hinder the fundamental requirements that Linux ransomware relies on to execute its operations. It implements a range of preemptive measures to prevent any efforts by the ransomware to obtain root privileges, and to obstruct the extraction of data that could enable multi-level extortion. The tactics employed by ZTRS are highly effective in safeguarding against the devastating consequences of Linux ransomware attacks.