2022
DOI: 10.3390/e24020239
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms

Abstract: Ransomware consists of malicious codes that restrict users from accessing their own files while demanding a ransom payment. Since the advent of ransomware, new and variant ransomwares have caused critical damage around the world, thus prompting the study of detection and prevention technologies against ransomware. Ransomware encrypts files, and encrypted files have a characteristic of increasing entropy. Due to this characteristic, a defense technology has emerged for detecting ransomware-infected files by mea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 18 publications
0
19
0
Order By: Relevance
“…Using an entropy value as an indication of crypto-ransomware infection has been a common feature in ransomware detection systems for many years, however, some previous research [ 7 ], and more recently [ 74 ], have investigated techniques that could be used by crypto-ransomware developers to avoid creating files with an elevated entropy value and thus avoid detection using these techniques. One suggested approach is to further encode the encrypted files in a way as to reduce their overall entropy value, by for example, using base64 encoding.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Using an entropy value as an indication of crypto-ransomware infection has been a common feature in ransomware detection systems for many years, however, some previous research [ 7 ], and more recently [ 74 ], have investigated techniques that could be used by crypto-ransomware developers to avoid creating files with an elevated entropy value and thus avoid detection using these techniques. One suggested approach is to further encode the encrypted files in a way as to reduce their overall entropy value, by for example, using base64 encoding.…”
Section: Discussionmentioning
confidence: 99%
“…The authors of these entropy reduction technique [ 7 , 74 ] state in their papers that they are currently theoretical techniques that could be used by ransomware, but to date, the authors have not encountered any crypto-ransomware strain that have employed them, suggesting that the entropy calculation detection avoidance techniques remain theoretical. This does not mean that these techniques will not be deployed in the future so one area of research would be to update the detection techniques so that they can identify these entropy reducing methods and then adapt their entropy calculation to take this in to account.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, the characteristics of the ciphertext used by ransomware producers are described. Encryption means converting plaintext into ciphertext using a cryptographic algorithm so that no one except for the person who has information on the key, which is secret information, can acquire the information needed to provide confidentiality [ 12 , 13 , 14 ]. Conversely, decryption is the reverse of encryption.…”
Section: Prior Knowledge and Related Workmentioning
confidence: 99%
“…3.1.2 Objective weights based on the entropy. The entropy was first used in the field of thermodynamics in physics and was first proposed by R. Xlausis and L. Boltgman (Lee and Lee, 2022). Given the evaluated alternatives and evaluation indicators, the entropy can determine the objective weight of each indicator, which is an effective method to determine the weight by information theory.…”
Section: Determining the Weight Of Each Evaluation Indicatormentioning
confidence: 99%