【24h】

On Deception-Based Protection Against Cryptographic Ransomware

机译:基于欺骗的加密勒索软件防护

获取原文

摘要

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-of-concept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them.
机译:为了检测恶意文件系统活动,一些商业和学术界的反勒索软件解决方案实施了基于欺骗的技术,特别是通过将诱饵文件放置在用户文件中。尽管这种方法对当前的勒索软件提出了更高的要求,但是对诱饵文件的任何访问都是恶意活动的标志,诱饵策略的鲁棒性尚未得到正式分析和充分测试。在本文中,我们分析了现有的诱饵策略,并通过定义一组衡量其鲁棒性的指标来讨论它们如何有效地对抗当前的勒索软件。为了演示勒索软件如何识别现有的基于欺骗的检测策略,我们实施了一种概念验证的反诱骗勒索软件,该软件使用很少规则的决策引擎成功绕过了诱饵。最后,我们讨论了基于诱饵的策略中存在的问题,并提出了缓解这些问题的实际解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号