2017
DOI: 10.1007/978-3-319-70290-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure

Abstract: Abstract. We present the Malware -O -Matic analysis platform and the Data Aware Defense ransomware countermeasure based on real time data gathering with as little impact as possible on system performance. Our solution monitors (and blocks if necessary) file system activity of all userland threads with new indicators of compromise. We successfully detect 99.37% of our 798 active ransomware samples with at most 70 MB lost per sample's thread in 90% of cases, or less than 7 MB in 70% of cases. By a careful analys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 33 publications
(47 citation statements)
references
References 9 publications
0
47
0
Order By: Relevance
“…In order to achieve detection, some Data Source is required along with the Processing of this data. The data source used for a given detection technique may require access to Kernel Space (such as in Data Aware Defense [22]), User Space (such as in RAPPER [23]) or both (such as in UNVEIL [20]). Additionally, any results from the raw data sources or the data processing steps could optionally be fed into Machine Learning algorithms in order to detect subtle patterns in the data to build models to distinguish between benign and malicious behaviour (as in ShieldFS [19]).…”
Section: Related Workmentioning
confidence: 99%
“…In order to achieve detection, some Data Source is required along with the Processing of this data. The data source used for a given detection technique may require access to Kernel Space (such as in Data Aware Defense [22]), User Space (such as in RAPPER [23]) or both (such as in UNVEIL [20]). Additionally, any results from the raw data sources or the data processing steps could optionally be fed into Machine Learning algorithms in order to detect subtle patterns in the data to build models to distinguish between benign and malicious behaviour (as in ShieldFS [19]).…”
Section: Related Workmentioning
confidence: 99%
“…This paper improves our first countermeasure presented in [1], which targets crypto-ransomware. The main idea is that encrypted data is indistinguishable from perfectly random data.…”
Section: Introductionmentioning
confidence: 73%
“…A high detection rate was achieved by their solution: 99.95%. A similar approach is used by Palisse et al, however, using the goodness-of-fit test to distinguish between encrypted and non encrypted files achieving 99.3% true positive rate [30].…”
Section: Host Based Ransomware Detectionmentioning
confidence: 99%