2018 2nd Cyber Security in Networking Conference (CSNet) 2018
DOI: 10.1109/csnet.2018.8602978
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Encrypted Your Files but You Restored Them from Network Traffic

Abstract: In a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium and large companies maintain hardware or software probes that monitor the traffic in critical network links, in order to evaluate service performance, detect security breaches, account for network or service usage, etc. In this paper we suggest using the monitoring capabilities in one of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…We can also offer file recovery using the network-based analysis probe but only in case of the file-sharing protocol being not encrypted. Non-encrypted protocols are for example versions 1 and 2 of SMB, and we showed a proof-of-concept of the file-recovery feature in a previous publication (Berrueta et al, 2018). Moussaileb et al (2018) monitored the file system traversal paths and velocity of the analysed programs.…”
Section: Locally Installed Toolsmentioning
confidence: 73%
“…We can also offer file recovery using the network-based analysis probe but only in case of the file-sharing protocol being not encrypted. Non-encrypted protocols are for example versions 1 and 2 of SMB, and we showed a proof-of-concept of the file-recovery feature in a previous publication (Berrueta et al, 2018). Moussaileb et al (2018) monitored the file system traversal paths and velocity of the analysed programs.…”
Section: Locally Installed Toolsmentioning
confidence: 73%
“…We have validated the implementation of stream reconstruction software and the SMB message dissection procedure creating an extension of this module capable of extracting the content of files transferred using SMB [10].…”
Section: A Smbtimementioning
confidence: 99%
“…In light of these evolving ransomware techniques, traditional cybersecurity measures focusing solely on preventing access breaches have become inadequate [11,18,19]. The need for advanced analytical tools capable of detecting and interpreting complex and subtle patterns of network traffic indicative of ransomware activities has become more critical [15,20,21]. Here, the Bidirectional Encoder Representations from Transformers (BERT) model emerges as a potent tool [22,23].…”
Section: Introductionmentioning
confidence: 99%