2019
DOI: 10.1007/978-3-030-22038-9_11
|View full text |Cite
|
Sign up to set email alerts
|

On Deception-Based Protection Against Cryptographic Ransomware

Abstract: In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering curren… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 17 publications
(27 reference statements)
0
19
0
Order By: Relevance
“…4.1. An orthogonal line of work focuses on decoy files for ransomware detection [48][49][50]. Such defenses are outside the scope of our work.…”
Section: Ransomware Detectionmentioning
confidence: 99%
“…4.1. An orthogonal line of work focuses on decoy files for ransomware detection [48][49][50]. Such defenses are outside the scope of our work.…”
Section: Ransomware Detectionmentioning
confidence: 99%
“…Distributed repositories should be placed in the file system containing randomly generated files of a predefined content to maximize the chances of succeeding using honeypot methodology. Re-designing decoys generation of the deception-based techniques improves the protection of the data of users, as mentioned in [22]. Threats arising from this cyber warfare are exponential.…”
Section: Discussionmentioning
confidence: 99%
“…Network Activity: Communication-related features such as source and destination IP addresses, ports, domain names, and protocols can be used by researchers to determine if a sample displays ransomware-like communication behavior. Resource Usage: Since ransomware relies on encryption operation, high CPU usage or memory usage can be a sign for the existence of ransomware in the system [74]. Sensor Readings: On-board sensor readings of PCs/workstations can give a clue on the abnormal activity which can signify the existence of ransomware in the system [184].…”
Section: Ransomware Analysis In Pcs/worktationsmentioning
confidence: 99%