首页> 外文OA文献 >Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence
【2h】

Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence

机译:知道异常,找到邪恶:频繁进行模式挖掘以进行勒索软件威胁搜寻和情报

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Emergence of crypto-ransomware has significantlyudchanged the cyber threat landscape. A crypto ransomwareudremoves data custodian access by encrypting valuable dataudon victims’ computers and requests a ransom payment to reinstantiate custodian access by decrypting data. Timely detection of ransomware very much depends on how quickly andudaccurately system logs can be mined to hunt abnormalities andudstop the evil. In this paper we first setup an environment toudcollect activity logs of 517 Locky ransomware samples, 535 Cerberudransomware samples and 572 samples of TeslaCrypt ransomware.udWe utilize Sequential Pattern Mining to find Maximal FrequentudPatterns (MFP) of activities within different ransomware familiesudas candidate features for classification using J48, Random Forest,udBagging and MLP algorithms. We could achieve 99% accuracyudin detecting ransomware instances from goodware samples andud96.5% accuracy in detecting family of a given ransomware sample. Our results indicate usefulness and practicality of applyingudpattern mining techniques in detection of good features for ransomware hunting. Moreover, we showed existence of distinctiveudfrequent patterns within different ransomware families whichudcan be used for identification of a ransomware sample family forudbuilding intelligence about threat actors and threat profile of audgiven target.
机译:加密勒索软件的出现极大地改变了网络威胁的格局。加密勒索软件 ud通过加密有价值的数据 udon受害人的计算机来删除数据保管人的访问权限,并要求赎金以解密数据来重新确立保管人的访问权限。对勒索软件的及时检测在很大程度上取决于可以多快,准确地挖掘系统日志来发现异常并阻止恶意行为。在本文中,我们首先设置一个环境来 ud收集517个Locky勒索软件样本,535个Cerber udransomware样本和572个TeslaCrypt勒索软件样本的活动日志。 ud我们利用顺序模式挖掘来发现不同活动中的最大活动频繁 udPatterns(MFP)使用J48,Random Forest, udBagging和MLP算法进行分类的勒索软件系列 udas候选功能。我们可以从良件样本中检测出勒索软件实例的准确度达到 udin的99%,而在检测给定勒索软件样本的族中则达到 ud96.5%的准确度。我们的结果表明,采用模式提取技术来检测勒索软件狩猎的良好特征的实用性和实用性。此外,我们展示了在不同勒索软件系列中存在独特的频繁模式,该 udc可用于识别勒索软件样本系列,以建立有关威胁行为者和目标对象的威胁概况的情报。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号