首页> 外文期刊>Journal of computer security >Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring
【24h】

Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring

机译:使用分组的注册表项操作,文件熵和文件签名监控多层赎金软件检测

获取原文
获取原文并翻译 | 示例
           

摘要

The last few years have come with a sudden rise in ransomware attack incidents, causing significant financial losses to individuals, institutions and businesses. In reaction to these attacks, ransomware detection has become an important topic for research in recent years. Currently, there are two broad categories of ransomware detection techniques: signature-based and behaviour-based analyses. On the one hand, signature-based detection, which mainly relies on a static analysis, can easily be evaded by code-obfuscation and encryption techniques. On the other hand, current behaviour-based models, which rely mainly on a dynamic analysis, face difficulties in accurately differentiating between user-triggered encryption from ransomware-triggered encryption. In the current paper, we present an upgraded behavioural ransomware detection model that reinforces the existing feature space with a new set of features based on grouped registry key operations, introducing a monitoring model based on combined file entropy and file signature. We analyze the new feature model by exploring and comparing three different linear machine learning techniques: SVM, logistic regression and random forest. The proposed approach helps achieve improved detection accuracy and provides the ability to detect novel ransomware. Furthermore, the proposed approach helps differentiate user-triggered encryption from ransomware-triggered encryption, allowing saving as many files as possible during an attack. To conduct our study, we use a new public ransomware detection dataset collected in our lab, which consists of 666 ransomware and 103 benign binaries. Our experimental results show that our proposed approach achieves relatively high accuracy in detecting both previously seen and novel ransomware samples.
机译:过去几年突然崛起的赎金软件攻击事件,对个人,机构和企业造成了重大的财务损失。在对这些攻击的反应中,兰非沃尔沃特检测已成为近年来研究的重要主题。目前,有两种广泛类别的赎金软件检测技术:基于签名和基于行为的分析。一方面,基于签名的检测,主要依赖于静态分析,可以通过代码混淆和加密技术轻松消除。另一方面,基于当前的行为的模型主要依赖于动态分析,面对从卷载涡轮触发加密的用户触发加密之间准确区分的困难。在目前的论文中,我们提出了一个升级的行为赎金软件检测模型,它通过基于分组的注册表关键操作,使用一组新的特征来加强现有的特征空间,引入了基于组合文件熵和文件签名的监视模型。我们通过探索和比较三种不同的线性机器学习技术来分析新功能模型:SVM,Logistic回归和随机林。所提出的方法有助于实现改进的检测精度,并提供检测新颖赎金软件的能力。此外,所提出的方法有助于区分用户触发的加密从勒索阀触发加密,允许在攻击期间保存尽可能多的文件。要进行我们的研究,我们使用在我们的实验室中收集的新的公共赎金软件检测数据集,其中包括666册和103份良性二进制文件。我们的实验结果表明,我们所提出的方法在检测先前看到和新的赎金软件样本方面取得了相对高的准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号