2019
DOI: 10.1109/access.2019.2931136
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems

Abstract: With the advent of big data and cloud services, user data has become an important issue. Although a variety of detection and prevention technologies are used to protect user data, ransomware that demands money in exchange for one's data has emerged. In order to detect and prevent ransomware, file-and behavior-based detection methods have been investigated. Nevertheless, we are still facing from ransomware threats, as it is difficult to detect and prevent ransomware containing unknown malicious codes. In partic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
78
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(78 citation statements)
references
References 36 publications
0
78
0
Order By: Relevance
“…The performance of the IDH is compared with the state of the art Honeypot and ransomware detection systems [20] is shown in Figure 11. In order to measure the efficiency of the proposed IDH and Honeypot, ransomware detection systems [20][14] [23], the same number of samples is tested and validated in both the proposed IDH and Honeypot, ransomware detection systems [20][14] [23]. A confusion matrix is constructed based on the results obtained, and the performance is evaluated based on the accuracy (a ratio of correctly predicted ransomwares to the total number of samples), precision (a ratio of correctly predicted positive ransomwares to the total predicted positive ransomwares) and Recall (a ratio of correctly predicted positive ransomwares to the total number of samples).…”
Section: A Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The performance of the IDH is compared with the state of the art Honeypot and ransomware detection systems [20] is shown in Figure 11. In order to measure the efficiency of the proposed IDH and Honeypot, ransomware detection systems [20][14] [23], the same number of samples is tested and validated in both the proposed IDH and Honeypot, ransomware detection systems [20][14] [23]. A confusion matrix is constructed based on the results obtained, and the performance is evaluated based on the accuracy (a ratio of correctly predicted ransomwares to the total number of samples), precision (a ratio of correctly predicted positive ransomwares to the total predicted positive ransomwares) and Recall (a ratio of correctly predicted positive ransomwares to the total number of samples).…”
Section: A Discussionmentioning
confidence: 99%
“…When the CryptoLocker starts to encrypt the files, the Honeyfolder sends an alert regarding the suspicious process and halts the process. Furthermore, to verify the process, the AuditWatch calculates the entropy value [23] for encrypted folders and sends the entropy value to the CEP engine. CEP engine correlates the values from the Honeyfolder, AuditWatch, and SDN application and generates an alert based on an advanced set of rules that provides a high degree of output accuracy.…”
Section: Ransomware Detection Using Idhmentioning
confidence: 99%
See 1 more Smart Citation
“…Monitoring file in the users' machine [11]- [13] has been used in the literature to detect ransomware [11]. In [11], the authors used an entropy-based technique to compare the status of original files in the backup and an infected file in its current state, thus stopping the synchronization if file is infected. This is an approach which can be considered as a countermeasure, however it has limitation towards the zero-day detection.…”
Section: Introductionmentioning
confidence: 99%
“…Initially, only communication theory used the concept of Shannon entropy. However, subsequently, the Shannon entropy began to be used in many different fields of science and technology such as machine learning [2], biomedical informatics [3], reliability [4], prognostics [5], fault detection [6], condition monitoring [7], maintenance [8], fingerprint recognition [9], geosciences [10], fatigue damage modeling [11], and many others.…”
Section: Introductionmentioning
confidence: 99%