UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 12 Issue 12
December-2025
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2512307


Registration ID:
573204

Page Number

d38-d45

Share This Article


Jetir RMS

Title

Deterrence against Zero Day Ransomware Strike - A Comparative Analysis

Abstract

A moderate risk for both individuals and organizations in the realm of network security and cybersecurity is Ransomware. Ransomware is a type of sophisticated malware that targets not only Windows-based operating systems but also Linux and Android. It does this by taking advantage of flaws in the various versions of these operating systems or device driver software to get access to a machine. Once inside, ransomware encrypts user files using strong cryptographic methods, making the data inaccessible and, in many cases, impossible to recover without proper backups. To bypass early security checks, ransomware often disguises itself as a legitimate file before execution. After the malicious payload is activated, reversing the encryption process becomes extremely difficult for known ransomware variants and nearly impossible when a previously unknown variant, commonly referred to as a zero-day attack, is involved. The objective of this paper is to provide a clear understanding of the challenges posed by ransomware and to examine existing mitigation techniques through the analysis of 25 relevant research studies. Several effective prevention strategies are discussed, including secure execution mechanisms, early detection of encryption activity, user-level authorization for file modifications, and Host Intrusion Prevention System (HIPS)–based controls. These approaches can significantly restrict ransomware execution and, in some cases, stop the attack entirely. Since unauthorized file encryption and modification form the core objective of ransomware, preventing these actions directly limits the attacker’s success. Therefore, implementing appropriate security measures before an attack occurs is essential for reducing ransomware impact.

Key Words

Ransomware, Cyber Attack, Virus, Cybersecurity, Malware, Encryption, Threat Detection

Cite This Article

"Deterrence against Zero Day Ransomware Strike - A Comparative Analysis", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.12, Issue 12, page no.d38-d45, December-2025, Available :http://www.jetir.org/papers/JETIR2512307.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Deterrence against Zero Day Ransomware Strike - A Comparative Analysis", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.12, Issue 12, page no. ppd38-d45, December-2025, Available at : http://www.jetir.org/papers/JETIR2512307.pdf

Publication Details

Published Paper ID: JETIR2512307
Registration ID: 573204
Published In: Volume 12 | Issue 12 | Year December-2025
DOI (Digital Object Identifier): https://doi.org/10.56975/jetir.v12i12.573204
Page No: d38-d45
Country: 24 Parganas North, West Bengal, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00016

Print This Page

Current Call For Paper

Jetir RMS