【24h】

On Deception-Based Protection Against Cryptographic Ransomware

机译:关于基于欺骗的保护对加密勒克斯制品

获取原文
获取外文期刊封面目录资料

摘要

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-of-concept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them.
机译:为了检测恶意文件系统活动,一些商业和学术反赎金软件解决方案实现了基于欺骗性的技术,具体是通过在用户文件中放置诱饵文件。虽然这种方法将杆升压到电流赎金软件,但随着对诱饵文件的任何访问是恶意活动的迹象,诱饵策略的稳健性尚未正式分析和全面测试。在本文中,我们分析了现有的诱饵策略,并讨论如何通过定义一组指标来对抗当前赎金软件来衡量其稳健性。为了展示赎金软件如何识别现有的基于欺骗性的检测策略,我们已经实施了概念验证的抗诱饵赎金软件,该禁令勒吉福州通过使用一些规则使用决策引擎成功绕过诱饵。最后,我们讨论了基于诱饵的策略的现有问题,并提出了减轻他们的实际解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号