International Business Machines Corporation
RANSOMWARE DETECTION AND PREVENTION
Last updated:
Abstract:
Embodiments are described for detecting ransomware attacks. Aspects include receiving a memory access request for a memory location. Aspects also include allowing the memory access request based on a determination that the memory location is not present in a decoy address table. Aspects further include terminating a process that made the memory access request based on a determination that the memory location is present in the decoy address table.
Status:
Application
Type:
Utility
Filling date:
3 Apr 2020
Issue date:
7 Oct 2021