首页> 外文会议>IEEE International Conference on Fuzzy Systems >Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering
【24h】

Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering

机译:Cyber​​Threat狩猎 - 第2部分:使用模糊散列跟踪勒索软件威胁演员和模糊C-MEARE集群

获取原文

摘要

Threat actors are constantly seeking new attack surfaces, with ransomeware being one the most successful attack vectors that have been used for financial gain. T his has been achieved through the dispersion of unlimited polymorphic samples of ransomware whilst those responsible evade detection and hide their identity. Nonetheless, every ransomware threat actor adopts some similar style or uses some common patterns in their malicious code writing, which can be significant evidence contributing to their identification. he first step in attempting to identify the source of the attack is to cluster a large number of ransomware samples based on very little or no information about the samples, accordingly, their traits and signatures can be analysed and identified. T herefore, this paper proposes an efficient fuzzy analysis approach to cluster ransomware samples based on the combination of two fuzzy techniques fuzzy hashing and fuzzy c-means (FCM) clustering. Unlike other clustering techniques, FCM can directly utilise similarity scores generated by a fuzzy hashing method and cluster them into similar groups without requiring additional transformational steps to obtain distance among objects for clustering. Thus, it reduces the computational overheads by utilising fuzzy similarity scores obtained at the time of initial triaging of whether the sample is known or unknown ransomware. The performance of the proposed fuzzy method is compared against k-means clustering and the two fuzzy hashing methods SSDEEP and SDHASH which are evaluated based on their FCM clustering results to understand how the similarity score affects the clustering results.
机译:威胁演员不断寻求新的攻击表面,RansomeWare是最成功的攻击向量,已被用于财务收益。他已经通过赎金软件的无限多态性样本的分散来实现,同时在那些负责的逃避检测并隐藏他们的身份。尽管如此,每个赎金软件威胁演员都采用一些类似的风格,或者在恶意代码写作中使用一些常见模式,这可能是有助于其识别的重要证据。他第一步试图识别攻击的来源是基于对样本的很少或没有关于样本的信息进行大量的赎金软件样本,因此,可以分析和识别它们的特征和签名。因此,本文提出了一种基于两种模糊技术模糊散列和模糊C型(FCM)聚类的两种模糊技术的组合来纳入勒克马库软件样本的有效模糊分析方法。与其他聚类技术不同,FCM可以直接利用模糊散列方法生成的相似性分数,并将它们集成到类似的组中,而不需要额外的变换步骤以获得用于聚类的对象之间的距离。因此,它通过利用在初始三脉冲时获得的模糊相似度分数来减少计算开销,该样本是已知的还是未知的勒索软件。将提出的模糊方法的性能与K-means聚类和两个模糊散列方法进行比较,并根据其FCM聚类结果评估的SSDeep和SDHASH,以了解相似度分数如何影响聚类结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号