Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3234691
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware's Early Mitigation Mechanisms

Abstract: Ransomware remains a modern trend. Attackers are still using cryptovirology forcing victims to pay. Notable attacks have been spreading since 2012, starting with Reveton's ransomware attack to the more recent 2017 WannaCry, Petya and Bad Rabbit cyberattacks. This Ransomware as a Service (RaaS) can lure criminals into developing tools to perform an attack without previous knowledge of the cryptosystem itself. We present in this paper a graph-based ransomware countermeasure to detect malicious threads. It is a n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 37 publications
(38 citation statements)
references
References 16 publications
0
38
0
Order By: Relevance
“…Nevertheless, RLocker has a limitation: it could be bypassed if a process passes randomly through the files without intercepting the lure folders. A similar limitation related to files traversals could be noticed in Moussaileb et al work for early mitigation mechanisms [28]. Even though their solution, solely based on file system exploration, is effective (up to 100% detection rate), their detection would be delayed if a ransomware uses multithreading for simultaneously traversing and encrypting the filesystem (some encrypted files are inevitable in this case).…”
Section: Host Based Ransomware Detectionmentioning
confidence: 78%
“…Nevertheless, RLocker has a limitation: it could be bypassed if a process passes randomly through the files without intercepting the lure folders. A similar limitation related to files traversals could be noticed in Moussaileb et al work for early mitigation mechanisms [28]. Even though their solution, solely based on file system exploration, is effective (up to 100% detection rate), their detection would be delayed if a ransomware uses multithreading for simultaneously traversing and encrypting the filesystem (some encrypted files are inevitable in this case).…”
Section: Host Based Ransomware Detectionmentioning
confidence: 78%
“…The decoy, entropy, and similarity techniques were employed by these data-centric solutions to monitor the file structure before and after it got accessed [8], [15], [23] - [25]. However, this approach is unable to differentiate between the changes caused by the crypto-ransomware form those caused by the benign programs, which lead to high rate of false alarms [9], [26], [27]. More importantly, this approach does not fully protect from ransomware attacks as it sacrifices part of the files that might be more valuable than the remaining data [26], [28].…”
Section: Related Workmentioning
confidence: 99%
“…Moussaileb et al proposed a ransomware detection method using decoy folders and file system traversal monitoring. Lee et al also discussed how to deploy decoy files to detect ransomware in users' machines.…”
Section: Related Workmentioning
confidence: 99%