The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1007/978-3-319-48965-0_32
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(41 citation statements)
references
References 14 publications
0
40
0
Order By: Relevance
“…In their solution, few files are lost. Another statistical technique was adopted by Mbol et al for ransomware detection [27]. Their focus was on JPEG files since they initially have high entropy.…”
Section: Host Based Ransomware Detectionmentioning
confidence: 99%
“…In their solution, few files are lost. Another statistical technique was adopted by Mbol et al for ransomware detection [27]. Their focus was on JPEG files since they initially have high entropy.…”
Section: Host Based Ransomware Detectionmentioning
confidence: 99%
“…These tasks are supported by strong machine learning solutions [26] and sandboxing [40]. The entropy-based malware analysis is frequent in the bibliography, which allows to distinguish files with encrypted content from the original assets [44]. In [14] the crypto-ransomware is detected by recognizing of strategies for asset discovery, which try to enumerate specific file extensions (e.g.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Previous papers [5,13,23], use the plug-in method (i.e, discrete symbols in histogram bins) to estimate the Shannon entropy. Nevertheless a study on TorrentLocker [17] shows that the Shannon entropy is not a good distinguisher especially with respect to JPEG compression 6 . Achieving encryption detection on compressed files that already have high entropy is a non-trivial task.…”
Section: Statistical Tests For Ransomware Attacks Detectionmentioning
confidence: 99%
“…For example, the specific problem of boot sectors encryption (e.g, master boot record) is not addressed in this paper, a solution is proposed by the Talos Group [26]. In addition, as outlined in Mbol et al [17], if an encryption algorithm preserving the distribution of the original files is used, it will evade the solution because randomness is the root of the detection. The ransomware which interleave malicious write operations with loops of unnecessary or redundant operations that look non random will go through DaD, as shown fig.…”
Section: Ransomware-like Applicationsmentioning
confidence: 99%
See 1 more Smart Citation