Simulating a Ransomware Attack for Security Evaluation
نوع المنشور
ورقة مؤتمر
المؤلفون

This paper presents a comprehensive simulation of 
a ransomware attack designed for educational and awareness 
purposes. The simulation follows the structure of a real-life 
cyberattack and is guided by the cyber kill chain framework. It 
replicates critical stages including delivery—via USB-based and 
email spoofing methods—exploitation, persistence, command-
and-control communication, and impact through file encryption 
and psychological pressure tactics. While some initial stages 
such as reconnaissance are simplified, the simulation provides a 
realistic and resolvable representation of ransomware behavior in 
mid-to-late attack phases. By evaluating various delivery methods 
and obfuscation techniques, this study enhances understanding of 
ransomware threats and supports the development of defensive 
strategies in a controlled environment. The findings highlight 
significant gaps in current detection mechanisms and emphasize 
the importance of proactive cybersecurity education.

المؤتمر
عنوان المؤتمر
ICAMAC2025: 2nd International Conference on Artificial Intelligence, Metaverse, and Cybersecurity
دولة المؤتمر
الإمارات العربية المتحدة
تاريخ المؤتمر
17 أكتوبر، 2025 - 18 أكتوبر، 2025
راعي المؤتمر
-
معلومات إضافية
موقع المؤتمر الإلكتروني