Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2989051
|View full text |Cite
|
Sign up to set email alerts
|

Poster

Abstract: Ransomware is one of the rising malwares in the crimeware family. It encrypts the user files and demands extortion money. From the perspective of an enterprise it is very crucial to detect and stop a ransomware attack. A well studied technique is to monitor file system behavior for suspicious activity. In this work we will show the gap in the existing state of art and describe a dynamic system which learns new behavior while under attack.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(4 citation statements)
references
References 4 publications
(12 reference statements)
0
4
0
Order By: Relevance
“…The anomaly detection approach utilizes benign to build normal profile. In the local environment, client-server approach used to build file tracker which works as dynamic ransomware [30]. In case of suspicious features notified, the server and user were given the signal of ransomware attack.…”
Section: Anomaly Detection Approachmentioning
confidence: 99%
“…The anomaly detection approach utilizes benign to build normal profile. In the local environment, client-server approach used to build file tracker which works as dynamic ransomware [30]. In case of suspicious features notified, the server and user were given the signal of ransomware attack.…”
Section: Anomaly Detection Approachmentioning
confidence: 99%
“…First, they impose a management burden coming from their installation and frequent update tasks when a large set of hosts is involved (Berrueta et al, 2019;Morato et al, 2018). Second, locally installed software that analyses system calls consumes CPU cycles at the user host, having a potential impact on computer responsiveness (Continella et al, 2016;Kharraz et al, 2016;Mehnaz et al, 2018;Shaukat & Ribeiro, 2018;Shukla et al, 2016). Third, malware capable of escalating privileges could deactivate the detection tool (Loman, 2019).…”
Section: Background and Related Workmentioning
confidence: 99%
“…• The read and write frequency is commonly used by these tools to detect the malware [29], [30]. Every ransomware must read and write the files to encrypt them, which they can do slowly to avoid being detected by these tools.…”
Section: History and Classification Of Ransomwarementioning
confidence: 99%