Analysis and Detection of Ransomware Through Its Delivery Methods

作者: Keertika Gangwar , Subhranshu Mohanty , A. K. Mohapatra

DOI: 10.1007/978-981-10-8527-7_29

关键词:

摘要: Cyber criminals are utilizing diverse approaches to draw money from internet users and organizations. Recently, a malware called ransomware has become effectively accessible for this job due its ease of availability distribution methods. Security experts working counter attacks by fixing the vulnerabilities operating system. In research work, we have proposed method prevent attack at early stages through delivery channels like Exploit Kits. We analyzed crawling patterns (listing file path, dropped file, network activity, ransom note etc.) victim’s computer. These been used extract features classification malicious samples. supervised machine learning algorithms malwares. Experimental results shows that accuracy 94% is achieved in tightly bound mode using random forest algorithm. While, 91% moderate

参考文章(13)
Ankita Khandelwal, A K Mohapatra, An insight into the security issues and their solutions for android phones international conference on computing for sustainable global development. pp. 106- 109 ,(2015)
Marco Cova, Christopher Kruegel, Giovanni Vigna, Detection and analysis of drive-by-download attacks and malicious JavaScript code the web conference. pp. 281- 290 ,(2010) , 10.1145/1772690.1772720
Kaleem Usmani, A. K. Mohapatra, Nupur Prakash, An Improved Framework for Incident Handling Information Security Journal: A Global Perspective. ,vol. 22, pp. 1- 9 ,(2013) , 10.1080/19393555.2012.751565
Adam L. Young, Cryptoviral extortion using Microsoft's Crypto API International Journal of Information Security. ,vol. 5, pp. 67- 76 ,(2006) , 10.1007/S10207-006-0082-7
Moti Yung, Adam Young, Cryptovirology: extortion-based security threats and countermeasures ieee symposium on security and privacy. pp. 129- 140 ,(1996) , 10.5555/525080.884259
Chris Grier, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Manufacturing compromise Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 821- 832 ,(2012) , 10.1145/2382196.2382283
Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks Detection of Intrusions and Malware, and Vulnerability Assessment. pp. 3- 24 ,(2015) , 10.1007/978-3-319-20550-2_1
Alexandre Gazet, Comparative analysis of various ransomware virii Journal in Computer Virology. ,vol. 6, pp. 77- 90 ,(2010) , 10.1007/S11416-008-0092-2
Amar Kumar Mohapatra, Nupur Prakash, Wired equivalent privacy reinvestigated Journal of Discrete Mathematical Sciences and Cryptography. ,vol. 13, pp. 141- 151 ,(2010) , 10.1080/09720529.2010.10698282