2019
DOI: 10.1007/978-3-030-34637-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

Abstract: Security operation centers (SOCs) typically use a variety of tools to collect large volumes of host logs for detection and forensic of intrusions. Our experience, supported by recent user studies on SOC operators, indicates that operators spend ample time (e.g., hundreds of man hours) on investigations into logs seeking adversarial actions. Similarly, reconfiguration of tools to adapt detectors for future similar attacks is commonplace upon gaining novel insights (e.g., through internal investigation or shared… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…Yassine Lemmou and El Mamoun Souidi [10] published a deep analysis over the behavior of Gandcrab ransomware on 2 subversions (v1.0 and v2.2r) out of 7 (v1.0, v1.1, v2.1, v2.1r, v2.2r, v2.3r, and v2.3.1r) subversions while Oleg Kolesnikov [17] mentioned the v4.1 has detected in July 2018 and it reached up to v5.2 March 2019 and observed all the versions have same payload with little changes. Gandcrab owner mentioned that they ceased their business on June 2019 [21]. Gandcrab kill the running process to avoid detection except antivirus, monitoring tools and some programs of operating system.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Yassine Lemmou and El Mamoun Souidi [10] published a deep analysis over the behavior of Gandcrab ransomware on 2 subversions (v1.0 and v2.2r) out of 7 (v1.0, v1.1, v2.1, v2.1r, v2.2r, v2.3r, and v2.3.1r) subversions while Oleg Kolesnikov [17] mentioned the v4.1 has detected in July 2018 and it reached up to v5.2 March 2019 and observed all the versions have same payload with little changes. Gandcrab owner mentioned that they ceased their business on June 2019 [21]. Gandcrab kill the running process to avoid detection except antivirus, monitoring tools and some programs of operating system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reference [18] referred malicious sites as first step to start of ransomware kill chain. According to [19] CryptoWall, PrincessLocker and CryptXXX while in [21] GandCrab uses this method to deliver attack.…”
Section: Malicious Websitesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, setting a fixed time is not applicable to all ransomware samples, since some variants exhibit their malicious activities after human interaction or discovering the executing environment. Machine learning-based methods have also been applied by the researchers in [34]. They have applied TF-IDF, Fisher's LDA and ET as machine learning method to detect ransomware.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Selecting the most relevant subset features from the original features can improve classifier performance and the accuracy of classification operation [41,45,40]; hence, the effective feature set was identified using term weight as the criterion of feature selection. We applied term frequency-inverse document frequency (TF-IDF) feature selection method for setting the weight to a term based on its inverse document frequency and evaluating how important feature is a document in the collection [36]. The purpose of using TF-IDF weighting is to eliminate those features that occur commonly in many vectors while giving more attention to features that are less frequent in the vectors.…”
Section: Feature Extraction and Selectionmentioning
confidence: 99%