<p dir="ltr">Ransomware attacks have rapidly evolved in sophistication and pose severe threats to organizations by encrypting critical data and demanding ransom payments. A key component in ransomware campaigns is the Command and Control (C2) communication where compromised systems establish outbound connections with malicious servers to receive instructions and exfiltrate data. As such, detecting C2 outbound traffic is crucial for early detection and mitigation of ransomware attacks. This paper provides a comprehensive analysis and comparison of existing detection techniques, and their respective tools specifically aimed at identifying ransomware C2 traffic</p>
History
Journal/Conference/Book title
The 11th IRC Conference on Science, Engineering and Technology (IRC-SET 2025)