2020
DOI: 10.1109/tetc.2017.2756908
|View full text |Cite
|
Sign up to set email alerts
|

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence

Abstract: Abstract-Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access by decrypting data. Timely detection of ransomware very much depends on how quickly and accurately system logs can be mined to hunt abnormalities and stop the evil. In this paper we first setup an environment to collect activity logs of 517 Locky ransomware… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 118 publications
(83 citation statements)
references
References 40 publications
0
82
0
Order By: Relevance
“…Moreover, the time constraint is also due to the encryption process involved in the ransomware infection that could also encrypt the collected information. The Wireshark and Process Monitor executables are launched on Windows OS 7 32 bits as in [21]. Each one of them has an independent task for collecting the following information: Wireshark collects the information about network activity whereas Process Monitor gathers the whole system activity (including network information).…”
Section: Data Collectionmentioning
confidence: 99%
“…Moreover, the time constraint is also due to the encryption process involved in the ransomware infection that could also encrypt the collected information. The Wireshark and Process Monitor executables are launched on Windows OS 7 32 bits as in [21]. Each one of them has an independent task for collecting the following information: Wireshark collects the information about network activity whereas Process Monitor gathers the whole system activity (including network information).…”
Section: Data Collectionmentioning
confidence: 99%
“…Identification of ransomware families is indeed a valuable research angle, as demonstrated by several other papers. Homayoun et al (2017) used Sequential Pattern Mining to detect best features that can be used to distinguish ransomware applications from benign applications. They focussed on three ransomware families (Locky, Cerber and TeslaCrypt) and were able to identify a given ransomware family with a 96.5% accuracy within 10 s of the ransomware's execution.…”
Section: Tools and Strategies For Analysing Ransomwarementioning
confidence: 99%
“…The outcomes have shown the improvement over the security performance in SDS systems. Dodangeh and Jahangir [2] have developed a new scheme to satisfy the security in WBAN. Two mutual authentication and key exchange protocols were proposed to deal with the overall network architecture in WBAN circumstances.…”
Section: Related Workmentioning
confidence: 99%