Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








245 Hits in 6.6 sec

Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics

Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk
2018 Computers & electrical engineering  
In this paper we present a novel Software-Defined Networking (SDN) based detection approach that utilizes characteristics of ransomware communication.  ...  Based on the observation of network communication of two crypto ransomware families, namely CryptoWall and Locky we conclude that analysis of the HTTP messages' sequences and their respective content sizes  ...  Software-defined networking (SDN) is now one of the emerging networking paradigms [1] .  ... 
doi:10.1016/j.compeleceng.2017.10.012 fatcat:ms6lbsdc2fhj3ojdhdxv3pg52i

Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall

Krzysztof Cabaj, Wojciech Mazurczyk
2016 IEEE Network  
In this paper we show how Software-Defined Networking (SDN) can be utilized to improve ransomware mitigation.  ...  Then we designed the SDN-based system, implemented using OpenFlow, which facilitates a timely reaction to this threat, and is a crucial factor in the case of crypto ransomware.  ...  These include hybrid approaches, classification-based methods that can detect ransomware based on its well-known network traffic characteristics, and pattern-based methods for automatic detection of the  ... 
doi:10.1109/mnet.2016.1600110nm fatcat:3h2wsrsqhnhnpibyai6ujg4gle

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

Abdullah Alqahtani, Frederick T. Sheldon
2022 Sensors  
The state-of-the-art crypto ransomware early detection models rely on specific data acquired during the runtime of an attack's lifecycle.  ...  Due to its unique characteristics, ransomware has attracted the attention of security professionals and researchers toward achieving safer and higher assurance systems that can effectively detect and prevent  ...  In a similar manner, Cabaj, Gregorczyk [26] used Software Defined Networking (SDN) approaches to track http packet patterns and item sizes to discover the cryptoWall class.  ... 
doi:10.3390/s22051837 pmid:35270983 pmcid:PMC8914995 fatcat:l7jjraawwfdpplviiwzwlwdfpy

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

2019 KSII Transactions on Internet and Information Systems  
Such evidence can be used as seed into intrusion detection systems for mitigation purposes.  ...  We examine three cryptoviral attack structures: browser-based crypto mining, memory resident crypto mining and cryptoviral extortion.  ...  The captured network traffic statistics are shown in Fig. 14.  ... 
doi:10.3837/tiis.2019.06.027 fatcat:nyeikojtzraarhpppv7tzsdtmy

Encryption analysis of AES-Cipher Block Chaining performance in Crypto-Wall Ransomware and SDN based mitigation

Anish Pillai, M S. Vasanthi, Ruturaj Kadikar, B Amutha
2018 International Journal of Engineering & Technology  
Modern ransomware behaviour indicates propagation of the malware from the host victim to other computers and shared drives within its network.  ...  The time taken for CryptoWall ransomware encryption using AES- CBC is observed for various data sizes and a SDN approach for ransomware threat mitigation is discussed.  ...  Acknowledgement We would like to express our gratitude to the research group, Software Defined Research Lab, Department of Computer Science Engineering, SRM Institute of Science and Technology, Kattankulathur  ... 
doi:10.14419/ijet.v7i2.24.11997 fatcat:z5bkyo4jqzctjagtut7mf455qa

A Survey on Situational Awareness of Ransomware Attacks—Detection and Prevention Parameters

Juan A. Herrera Silva, Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay, Myriam Hernández-Álvarez
2019 Remote Sensing  
This survey also provides a classification of ransomware articles based on detection and prevention approaches.  ...  SA allows knowing what is happening in compromised devices and network communications through monitoring, aggregation, correlation, and analysis tasks.  ...  The main idea behind this proposal is the characterization of HTTP traffic and crypto ransomware communications, specifically CryptoWall and Locky.  ... 
doi:10.3390/rs11101168 fatcat:rgppyyyfarbolii2qbvjifo5wm

A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

Iman Almomani, Aala Alkhayer, Walid El-Shafai
2022 Sensors  
., ransomware) and for defensive or offensive purposes. This paper introduces a hybrid crypto-steganography approach for ransomware hiding within high-resolution video frames.  ...  Initially, AES encrypts the secret Android ransomware data, and then LSB embeds it based on random selection criteria for the cover video pixels.  ...  In the first technique, the malicious software is concealed by simulating the network traffic of a benign app.  ... 
doi:10.3390/s22062281 pmid:35336452 pmcid:PMC8955722 fatcat:kye35ukuxvfunbxixhm7d453uq

A Review on File System-based Ransomware Detection

Srinivasa M
2020 International Journal for Research in Applied Science and Engineering Technology  
In this paper, we are comparing the existing model with our proposed model which is used for ransomware detection based on file indicators of compromise (IOC).  ...  It is becoming more sophisticated attack in evading detection of defense layer and continue grow rapidly. It has become challenging task to detect this ransomware attack at early stage.  ...  By using this method, we were able to identify and detect the ransomware family based on specific file behaviors.  ... 
doi:10.22214/ijraset.2020.31245 fatcat:xozkwraq4ndsjnrteqoq5lm4gu

Open Repository for the Evaluation of Ransomware Detection Tools

Eduardo Berrueta, Daniel Morato, Eduardo Magana, Mikel Izal
2020 IEEE Access  
These data have already been used successfully in the evaluation of a network-based ransomware detection algorithm.  ...  INDEX TERMS Ransomware, open repository, traffic analysis.  ...  It can be useful for testing some tools that detect the ransomware based on local I/O operations.  ... 
doi:10.1109/access.2020.2984187 fatcat:d5pw22wmdnconnsqmy4pnsiwsy

Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)

Rusydi Umar, Imam Riadi, Ridho Surya Kusuma
2021 International Journal of Safety and Security Engineering  
Based on the percentage data, SDN-based mitigation in this study is per the objectives to make it possible to mitigate Ransomware attacks on computer network traffic.  ...  The mitigation process is carried out through static, dynamic, and Software-Defined Networking (SDN) analysis to prevent the impact of attacks through programmatic network management.  ...  the system detects ransomware network traffic by identifying the IP Address and port that OpenFlow passes through and based on the data in Table 9 .  ... 
doi:10.18280/ijsse.110304 fatcat:rdevk64y6ndkdh72hvsa5ct4ve

A Comparative Performance Analysis of Explainable Machine Learning Models With And Without RFECV Feature Selection Technique Towards Ransomware Classification [article]

Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy
2022 arXiv   pre-print
classification utilizing the API call and network traffic features.  ...  ransomware detection, or classification.  ...  [31] used TShark for capturing and analyzing malicious network traffic activities followed by utilizing the WEKA ML tool to detect ransomware based on only 9 extracted features.  ... 
arXiv:2212.04864v1 fatcat:hm4vfvp4wvcdtn3dvfe3y4nu4e

Trends and Future Directions in Automated Ransomware Detection

Abayomi Jegede, Ayotinde Fadele, Monday Onoja, Gilbert Aimufua, Ismaila Jesse Mazadu
2022 Journal of Computing and Social Informatics  
A successful ransomware attack results in significant security and privacy violations with attendant financial losses and reputational damages to owners of computer-based resources.  ...  This makes it imperative for accurate, timely and reliable detection of ransomware.  ...  The technique extracts and models ransomware features based on three major characteristics of network traffic namely, connection-based, encryption-based, and certificate.  ... 
doi:10.33736/jcsi.4932.2022 fatcat:divmlxpnmffd7aqh4t5uzanvlu

A Cyber-Kill-Chain based taxonomy of crypto-ransomware features

Tooska Dargahi, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti, Giuseppe Bianchi, Loris Benedetto
2019 Journal in Computer Virology and Hacking Techniques  
Wide range of features which are available in different families and versions of ransomware further complicates their detection and analysis.  ...  Therefore, a ransomware feature taxonomy would advance cyber defenders' understanding of associated risks of ransomware.  ...  In [176] , authors proposed the usage of software-defined networking (SDN) to mitigate ransomware attacks.  ... 
doi:10.1007/s11416-019-00338-7 fatcat:rjvlals56jclbei54t7pz2ra6q

Ransomware in Windows and Android Platforms [article]

Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu
2020 arXiv   pre-print
Recent indiscriminate ransomware victimizations have imposed critical needs of effective detection techniques to prevent damages.  ...  This paper contributes a comprehensive overview of ransomware attacks and summarizes existing detection and prevention techniques in both Windows and Android platforms.  ...  Messages can be encrypted by using the Transport Layer Security (TLS). Thus, it is more difficult to detect ransomware using anti-malware software.  ... 
arXiv:2005.05571v1 fatcat:7e3bx2ufsrhbhn3var5phejicy

PayBreak

Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
PayBreak is based on the insight that secure file encryption relies on hybrid encryption where symmetric session keys are used on the victim computer.  ...  Existing defenses against ransomware rely on ad-hoc mitigations that target the incorrect use of cryptography rather than generic live protection.  ...  Acknowledgements We would like to thank the anonymous reviewers for their insightful comments and our shepherd Guofei Gu for helping us improve the quality of this manuscript.  ... 
doi:10.1145/3052973.3053035 dblp:conf/ccs/KolodenkerKSE17 fatcat:3auytq6vhnabthxs2fank4ib3e
« Previous Showing results 1 — 15 out of 245 results