首页> 外文会议>International Conference on Computational Intelligence >Behavioural Analysis of Recent Ransom wares and Prediction of Future Attacks by Polymorphic and Metamorphic Ransomware
【24h】

Behavioural Analysis of Recent Ransom wares and Prediction of Future Attacks by Polymorphic and Metamorphic Ransomware

机译:多态和变质赎金软件的近期赎金商品的行为分析与未来攻击的预测

获取原文

摘要

Attackers understand that data, files, networks and all digital resources are a key factor in the regular working and growth of any business. And because these digital resources are so dear to the business, the best and quickest way to earn big money is to hold all these resources at ransom. Thus, born ransomware are malwares that normally encrypt all your important files and ask for money to provide you with the decryption key. Some ransomware enters the system through social engineering, while others try to find vulnerabilities, open ports or employ backdoors to get inside. In any case, their main aim is commercial gain. Ransomware is the biggest threat to enterprises and has the potential to bring business at standstill and cause huge loss to economy. In this paper, we do an analytical study of the behaviours of the recent ransomwares that have attacked businesses and individuals alike. We run them in a simulated environment and analyse their attack process, file system analysis, persistence analysis and network-level analysis. We also employ tools like Cuckoo to do this behaviour analysis part. After that, we predict the future types of ransomwares which can be created easily by using available toolkits like ADMMutate, Clet and Phatbot. We also predict the impact and the threat they can cause and how difficult it would be to detect them after they employ all the mentioned stealth techniques.
机译:攻击者了解数据,文件,网络和所有数字资源是任何业务的正常工作和增长的关键因素。因为这些数字资源对业务如此珍贵,所以获得大笔资金的最佳和最快的方式是在赎金中掌握所有这些资源。因此,出生的赎金软件是恶意的恶意,通常加密所有重要文件并要求钱为您提供解密密钥。一些赎金软件通过社交工程进入系统,而其他赎金软件则尝试找到漏洞,打开港口或使用后门进入内部。无论如何,他们的主要目标是商业收益。赎金软件是对企业的最大威胁,并有可能在静止时带来业务并导致经济造成巨大的损失。在本文中,我们对袭击企业和个人相似的瑞郎的行为进行了分析研究。我们在模拟环境中运行它们,并分析他们的攻击过程,文件系统分析,持久性分析和网络级分析。我们还使用像杜鹃这样的工具来完成此行为分析部分。之后,我们预测未来的ransomwares类型可以通过使用广告,CLET和Phatbot等可用的工具包轻松创建。我们还预测了他们可能导致的影响和威胁以及在雇用所有提到的隐形技术后检测到它们是多么困难。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号