2020
DOI: 10.1109/access.2020.2984187
|View full text |Cite
|
Sign up to set email alerts
|

Open Repository for the Evaluation of Ransomware Detection Tools

Abstract: Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied before the ransomware encrypts files or during its action in an infected host. The evaluation of these proposals has always been accomplished using sets of ransomware samples that are prepared locally for the research article, without making the data available… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Over the years, significant advances have been made in ransomware detection, especially after the devastation that WannaCry caused in 2017 (Adamov & Carlsson, 2017;Berrueta, Morato, Magana, et al, 2020;Fernando, Komninos & Chen, 2020;Molina, Torabi, Sarieddine, et al, 2021;Singh et al, 2019a). Although researchers explored avenues for detection such as static and dynamic information, ransomware has managed to evade static analysis (Subedi et al, 2018).…”
Section: Related Workmentioning
confidence: 99%
“…Over the years, significant advances have been made in ransomware detection, especially after the devastation that WannaCry caused in 2017 (Adamov & Carlsson, 2017;Berrueta, Morato, Magana, et al, 2020;Fernando, Komninos & Chen, 2020;Molina, Torabi, Sarieddine, et al, 2021;Singh et al, 2019a). Although researchers explored avenues for detection such as static and dynamic information, ransomware has managed to evade static analysis (Subedi et al, 2018).…”
Section: Related Workmentioning
confidence: 99%
“…The traffic traces for the 'infected' case were obtained from a repository we built and shared publicly in (Berrueta et al, 2020;Berrueta et al, 2022). This repository comprises traffic traces from more than 70 ransomware programs.…”
Section: Datasetmentioning
confidence: 99%
“…There are variants that apply compression to the written data (CTBLocker), variants that batch the file deletion operations (WannaCry), variants that do only partial overwrites of the original files (Shade), or variants operating at low speeds (Revenge), to name a few relevant features. More detail about the binaries and the traffic traces can be found in Berrueta et al (2020) or Berrueta et al (2022); we offer statistics, downloadable traffic files, links to the malware binaries, and text files containing all the file-access operations executed.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…For that, some public repositories of malware samples are available. One example of that is [51], but in this case just pcap files are available instead of malware samples themselves. Therefore, we have acquired the experimental samples from TheZoo repository [52].…”
Section: Experimental Evaluationmentioning
confidence: 99%