Defense and Recovery Strategies for Flash-Based Storage Under Ransomware Attacks: A Survey
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yin, Junhong | - |
dc.contributor.author | Kang, Kyungtae | - |
dc.date.accessioned | 2025-05-26T07:31:04Z | - |
dc.date.available | 2025-05-26T07:31:04Z | - |
dc.date.issued | 2025-02 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/125432 | - |
dc.description.abstract | As ransomware evolves, traditional OS-based de-tection mechanisms face growing challenges, particularly from advanced attacks exploiting system vulnerabilities and escalating privileges. The continuous evolution of ransomware attacks has driven researchers to explore storage-level defense strategies, focusing on the potential of Solid-State Drives (SSDs) to enhance data protection and recovery. This paper presents a compre-hensive survey of the current state and future developments in SSD firmware-level ransomware detection and recovery, based on literature published between 2015 and 2024. Firmware-level I/O monitoring helps detect ransomware by identifying the typical 'read-encrypt-overwrite' pattern. This low-level access offers an advantage in detecting ransomware activity. However, conventional detection methods are often prone to false pos-itives. To enhance detection accuracy, some systems integrate machine learning models within the SSD controllers, analyzing I/O request patterns and entropy values of written data to assess potential threats. The Garbage Collection(Gc)mechanism plays a crucial role in data recovery by retaining older versions of data until reclaimed, which can aid in restoring encrypted content. Similarly, backing up legitimate I/O operations incurs performance overhead. To address this, some systems utilize techniques such as neural networks and remote backups to reduce unnecessary performance degradation. Future research should prioritize developing lightweight solutions tailored for SSDs with limited computational resources. Emphasis should be placed on enhancing the timeliness of real-time detection to effectively respond to the rapidly evolving nature of ransomware attacks. © 2025 IEEE. | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Defense and Recovery Strategies for Flash-Based Storage Under Ransomware Attacks: A Survey | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/ICEIC64972.2025.10879685 | - |
dc.identifier.scopusid | 2-s2.0-86000027883 | - |
dc.identifier.bibliographicCitation | 2025 International Conference on Electronics, Information, and Communication, ICEIC 2025 | - |
dc.citation.title | 2025 International Conference on Electronics, Information, and Communication, ICEIC 2025 | - |
dc.type.docType | Conference paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Data privacy | - |
dc.subject.keywordPlus | Energy efficiency | - |
dc.subject.keywordPlus | Ferroelectric RAM | - |
dc.subject.keywordPlus | Flash-based SSDs | - |
dc.subject.keywordPlus | Intelligent systems | - |
dc.subject.keywordPlus | Malware | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Neural networks | - |
dc.subject.keywordPlus | Programmable logic controllers | - |
dc.subject.keywordPlus | 'current | - |
dc.subject.keywordPlus | Conventional detection | - |
dc.subject.keywordPlus | Data protection and recoveries | - |
dc.subject.keywordPlus | Defense strategy | - |
dc.subject.keywordPlus | Detection and recovery | - |
dc.subject.keywordPlus | Detection methods | - |
dc.subject.keywordPlus | Recovery strategies | - |
dc.subject.keywordPlus | Solid-state drive | - |
dc.subject.keywordPlus | Storage level | - |
dc.subject.keywordPlus | System vulnerability | - |
dc.subject.keywordPlus | Firmware | - |
dc.subject.keywordAuthor | Detection and Recovery | - |
dc.subject.keywordAuthor | Ransomware | - |
dc.subject.keywordAuthor | Solid-State Drive | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.