首页> 外文会议>IEEE International Conference on Fuzzy Systems >Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
【24h】

Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules

机译:Cyber​​Threat狩猎 - 第1部分:使用模糊散列,进口散列和雅拉规则进行三环赎金瓶

获取原文

摘要

Ransomware is currently one of the most significant cyberthreats to both national infrastructure and the individual, often requiring severe treatment as an antidote. Triaging ran-somware based on its similarity with well-known ransomware samples is an imperative preliminary step in preventing a ransomware pandemic. Selecting the most appropriate triaging method can improve the precision of further static and dynamic analysis in addition to saving significant t ime a nd e ffort. Currently, the most popular and proven triaging methods are fuzzy hashing, import hashing and YARA rules, which can ascertain whether, or to what degree, two ransomware samples are similar to each other. However, the mechanisms of these three methods are quite different and their comparative assessment is difficult. Therefore, this paper presents an evaluation of these three methods for triaging the four most pertinent ransomware categories WannaCry, Locky, Cerber and CryptoWall. It evaluates their triaging performance and run-time system performance, highlighting the limitations of each method.
机译:Ransomware目前是国家基础设施和个体最重要的网步人之一,通常需要严重治疗作为解毒剂。基于其与众所周知的赎金软件样本的相似性的三环RAN-Somware是防止勒索瓶流行病的初步步骤。选择最合适的三环方法可以提高进一步静态和动态分析的精度,除了节省重要的问题,也可以提高IME。目前,最受欢迎和经过验证的三环方法是模糊散列,导入散列和雅拉规则,可以确定是否彼此相似的两个勒索软件样本。然而,这三种方法的机制是完全不同的,并且它们的比较评估很困难。因此,本文介绍了这三种三种三种最相关的瑞马仓库Wannacry,Locky,Cerber和Cryptowall的方法的评估。它评估了它们的Triaging性能和运行时系统性能,突出显示了每个方法的限制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号