Skip to main content

2018 | OriginalPaper | Buchkapitel

Analysis and Detection of Ransomware Through Its Delivery Methods

verfasst von : Keertika Gangwar, Subhranshu Mohanty, A. K. Mohapatra

Erschienen in: Data Science and Analytics

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber criminals are utilizing diverse approaches to draw money from internet users and organizations. Recently, a malware called ransomware has become effectively accessible for this job due to its ease of availability and distribution methods. Security experts are working to counter ransomware attacks by fixing the vulnerabilities of operating system. In this research work, we have proposed a method to prevent the ransomware attack at its early stages through its delivery channels like Exploit Kits. We have analyzed the crawling patterns (listing of file path, dropped file, network activity, ransom note etc.) of victim’s computer. These patterns have been used to extract the features for classification of malicious samples. We have used supervised machine learning algorithms for classification of malwares. Experimental results shows that accuracy of 94% is achieved in tightly bound mode by using random forest algorithm. While, accuracy of 91% is achieved in moderate bound mode by using random forest classification algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khandelwal, A., Mohapatra, A.K.: An insight into the security issues and their solutions for android phones. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 106–109. IEEE, March 2015 Khandelwal, A., Mohapatra, A.K.: An insight into the security issues and their solutions for android phones. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 106–109. IEEE, March 2015
2.
Zurück zum Zitat Usmani, K., Mohapatra, A.K., Prakash, N.: An improved framework for incident handling. Inf. Secur. J.: Glob. Perspect. 22(1), 1–9 (2013) Usmani, K., Mohapatra, A.K., Prakash, N.: An improved framework for incident handling. Inf. Secur. J.: Glob. Perspect. 22(1), 1–9 (2013)
3.
Zurück zum Zitat Kumari, N., Mohapatra, A.K.: An insight into digital forensics branches and tools. In: 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 243–250. IEEE, March 2016 Kumari, N., Mohapatra, A.K.: An insight into digital forensics branches and tools. In: 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 243–250. IEEE, March 2016
4.
Zurück zum Zitat Scaife, N., Carter, H., Traynor, P., Butler, K.R.B.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303–312. IEEE (2016) Scaife, N., Carter, H., Traynor, P., Butler, K.R.B.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303–312. IEEE (2016)
5.
Zurück zum Zitat Ransomware: How consumers and businesses value their data. IBM X-Force® Research, IBM Security. Accessed 15 Jan 2017 Ransomware: How consumers and businesses value their data. IBM X-Force® Research, IBM Security. Accessed 15 Jan 2017
7.
Zurück zum Zitat Sgandurra, D., Muñoz-González, L., Mohsen, R., Lupu, E.C.: Automated dynamic analysis of ransomware: benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020 (2016) Sgandurra, D., Muñoz-González, L., Mohsen, R., Lupu, E.C.: Automated dynamic analysis of ransomware: benefits, limitations and use for detection. arXiv preprint arXiv:​1609.​03020 (2016)
8.
Zurück zum Zitat Kharraz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 757–772. USENIX Association (2016) Kharraz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 757–772. USENIX Association (2016)
9.
Zurück zum Zitat Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE (1996) Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE (1996)
10.
Zurück zum Zitat Young, A., Yung, M.: Malicious Cryptography: Exposing Cryptovirology. Wiley, Hoboken (2004) Young, A., Yung, M.: Malicious Cryptography: Exposing Cryptovirology. Wiley, Hoboken (2004)
11.
Zurück zum Zitat Young, A.L.: Cryptoviral extortion using Microsoft’s Crypto API. Int. J. Inf. Secur. 5(2), 67–76 (2006)CrossRef Young, A.L.: Cryptoviral extortion using Microsoft’s Crypto API. Int. J. Inf. Secur. 5(2), 67–76 (2006)CrossRef
14.
Zurück zum Zitat Mohapatra, A.K., Prakash, N.: Wired equivalent privacy reinvestigated. J. Discrete Math. Sci. Crypt. 13(2), 141–151 (2010)MATH Mohapatra, A.K., Prakash, N.: Wired equivalent privacy reinvestigated. J. Discrete Math. Sci. Crypt. 13(2), 141–151 (2010)MATH
16.
Zurück zum Zitat Grier, C., et al.: Manufacturing compromise: the emergence of exploit-as-a-service. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM (2012) Grier, C., et al.: Manufacturing compromise: the emergence of exploit-as-a-service. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM (2012)
17.
Zurück zum Zitat Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proceedings of the 19th International Conference on World Wide Web. ACM (2010) Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proceedings of the 19th International Conference on World Wide Web. ACM (2010)
18.
Zurück zum Zitat Gazet, A.: Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)CrossRef Gazet, A.: Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)CrossRef
Metadaten
Titel
Analysis and Detection of Ransomware Through Its Delivery Methods
verfasst von
Keertika Gangwar
Subhranshu Mohanty
A. K. Mohapatra
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8527-7_29