首页> 外文会议>International Symposium on Systems Engineering >A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems
【24h】

A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems

机译:一种赎金软件检测方法,采用模糊散测,用于缓解信息系统遮挡的风险

获取原文

摘要

Today, a significant threat to organisational information systems is ransomware that can completely occlude the information system by denying access to its data. To reduce this exposure and damage from ransomware attacks, organisations are obliged to concentrate explicitly on the threat of ransomware, alongside their malware prevention strategy. In attempting to prevent the escalation of ransomware attacks, it is important to account for their polymorphic behaviour and dispersion of inexhaustible versions. However, a number of ransomware samples possess similarity as they are created by similar groups of threat actors. A particular threat actor or group often adopts similar practices or codebase to create unlimited versions of their ransomware. As a result of these common traits and codebase, it is probable that new or unknown ransomware variants can be detected based on a comparison with their originating or existing samples. Therefore, this paper presents a detection method for ransomware by employing a similarity preserving hashing method called fuzzy hashing. This detection method is applied on the collected WannaCry or WannaCryptor ransomware corpus utilising three fuzzy hashing methods SSDEEP, SDHASH and mvHASH-B to evaluate the similarity detection success rate by each method. Moreover, their fuzzy similarity scores are utilised to cluster the collected ransomware corpus and its results are compared to determine the relative accuracy of the selected fuzzy hashing methods.
机译:今天,对组织信息系统的重大威胁是赎金软件,可以通过拒绝访问其数据来完全遮挡信息系统。为了减少赎金软件攻击的曝光和损坏,组织有义务明确地专注于赎金软件的威胁,以及他们的恶意软件预防策略。在尝试防止赎金软件攻击的升级时,重要的是考虑其无穷无尽的版本的多态行为和分散。然而,许多赎金软件样本具有相似性,因为它们是由类似的威胁演员组创建的。特定的威胁演员或组通常采用类似的实践或CodeBase来创建其赎金软件的无限版本。由于这些常见的特征和代码库,可能可以基于与其始发或现有样本的比较来检测新的或未知的勒索仓变量。因此,本文通过采用称为模糊散列的相似性保留散列方法呈现勒索软件的检测方法。利用三种模糊散列方法SSDEEP,SDHASH和MVHASH-B应用于收集的Wannacry或Wannacryptor勒索仓库语料库中的该检测方法来评估每种方法的相似性检测成功率。此外,利用它们的模糊相似度分数来聚类收集的勒索软件语料库,并将其结果进行比较,以确定所选择的模糊散列方法的相对精度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号