International Business Machines Corporation
RANSOMWARE DETECTION AND PREVENTION

Last updated:

Abstract:

Embodiments are described for detecting ransomware attacks. Aspects include receiving a memory access request for a memory location. Aspects also include allowing the memory access request based on a determination that the memory location is not present in a decoy address table. Aspects further include terminating a process that made the memory access request based on a determination that the memory location is present in the decoy address table.

Status:
Application
Type:

Utility

Filling date:

3 Apr 2020

Issue date:

7 Oct 2021