首页> 外文会议>IEEE International Conference on Fuzzy Systems >Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering
【24h】

Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering

机译:网络威胁搜寻-第2部分:使用模糊散列和模糊C均值聚类跟踪勒索软件威胁参与者

获取原文

摘要

Threat actors are constantly seeking new attack surfaces, with ransomeware being one the most successful attack vectors that have been used for financial gain. T his has been achieved through the dispersion of unlimited polymorphic samples of ransomware whilst those responsible evade detection and hide their identity. Nonetheless, every ransomware threat actor adopts some similar style or uses some common patterns in their malicious code writing, which can be significant evidence contributing to their identification. he first step in attempting to identify the source of the attack is to cluster a large number of ransomware samples based on very little or no information about the samples, accordingly, their traits and signatures can be analysed and identified. T herefore, this paper proposes an efficient fuzzy analysis approach to cluster ransomware samples based on the combination of two fuzzy techniques fuzzy hashing and fuzzy c-means (FCM) clustering. Unlike other clustering techniques, FCM can directly utilise similarity scores generated by a fuzzy hashing method and cluster them into similar groups without requiring additional transformational steps to obtain distance among objects for clustering. Thus, it reduces the computational overheads by utilising fuzzy similarity scores obtained at the time of initial triaging of whether the sample is known or unknown ransomware. The performance of the proposed fuzzy method is compared against k-means clustering and the two fuzzy hashing methods SSDEEP and SDHASH which are evaluated based on their FCM clustering results to understand how the similarity score affects the clustering results.
机译:威胁参与者一直在寻找新的攻击面,勒索软件是最成功的攻击手段之一,已被用来牟取金钱。通过分散无限制的勒索软件多态样本,而那些逃避检测并隐藏其身份的人,已经实现了这一目标。尽管如此,每个勒索软件威胁参与者在其恶意代码编写中都采用了类似的样式或使用了一些常见的模式,这可能是有助于其识别的重要证据。尝试确定攻击源的第一步是根据关于样本的信息很少或没有信息,对大量勒索软件样本进行聚类,因此,可以对其特征和特征进行分析和识别。因此,本文结合两种模糊技术,模糊哈希和模糊c均值(FCM)聚类,提出了一种有效的模糊分析方法,用于群集勒索软件样本。与其他聚类技术不同,FCM可以直接利用由模糊哈希方法生成的相似性分数并将它们聚类为相似的组,而无需其他转换步骤来获得对象之间的距离进行聚类。因此,它通过利用在对样本是已知的还是未知的勒索软件进行初始分类时获得的模糊相似性评分来减少计算开销。将所提出的模糊方法的性能与k-means聚类进行比较,并基于FCM聚类结果对这两种模糊哈希方法SSDEEP和SDHASH进行评估,以了解相似性得分如何影响聚类结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号