2022
DOI: 10.3390/e24101503
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many crypto-ransomware detection techniques is to monitor file system activity and attempt to identify encrypted files being written to disk, often using a file’s entropy as an indicator of encryption. However, often in the description of these techniques, little or no d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 45 publications
0
11
0
Order By: Relevance
“…Therefore, an increase in entropy can be considered an important metric for ransomware detection. However, here we note that just relying on the calculated Shannon entropy value to distinguish between encrypted and non-encrypted files would be a difficult task generating a lot of false positives and negatives [ 39 ]. In Section 5 , we show our experimental result on this issue.…”
Section: Ransomware Detection and Neutralization Methodsmentioning
confidence: 99%
“…Therefore, an increase in entropy can be considered an important metric for ransomware detection. However, here we note that just relying on the calculated Shannon entropy value to distinguish between encrypted and non-encrypted files would be a difficult task generating a lot of false positives and negatives [ 39 ]. In Section 5 , we show our experimental result on this issue.…”
Section: Ransomware Detection and Neutralization Methodsmentioning
confidence: 99%
“…In other words, information entropy refers to the uniformity of data, and if the data are uniform, they have high entropy. Conversely, if the data are not uniform and are deviated, they have relatively low entropy [8][9][10]. In this case, entropy can range from zero to eight.…”
Section: Prior Knowledge and Related Workmentioning
confidence: 99%
“…Many ransomware programs have the feature of maintaining the file type representing the information of the original file in the file name to seamlessly decode the encrypted file when the user pays for it [8]. Due to these characteristics, even if a file is infected with ransomware, the file type can be determined; therefore, it is believed that it is possible to learn a model using the file type characteristics and detect a file infected with ransomware.…”
Section: File Type Featurementioning
confidence: 99%
See 1 more Smart Citation
“…As a related work, [ 20 ] proposed a zone division-based ransomware detection method to detect ransomware by separating areas containing file metadata, such as file headers, footers, signature information, and file contents that define file extensions in binary data. In [ 15 ], features for entropy distribution were derived for various file formats and machine learning models, such as KNN (K-Nearest Neighbor), linear regression, ridge regression, logistics regression, decision tree, random forest, SVM (Support Vector Machine), and MLP (Multi-Layer Perception), which were applied.…”
Section: Prior Knowledge and Related Workmentioning
confidence: 99%