2022
DOI: 10.1007/s00521-022-07586-7
|View full text |Cite
|
Sign up to set email alerts
|

Reliable detection of compressed and encrypted data

Abstract: Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted data fragments. Typically, current approaches employ statistics derived from byte-level distribution, such as entropy estimation, to identify encrypted fragments. However, modern content types use compression techniques which alter data distribution pushing it closer to the uniform distribution. The result is that current approaches exhibit unreliable encryption detection per… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…One suggested approach is to further encode the encrypted files in a way as to reduce their overall entropy value, by for example, using base64 encoding. However, despite this theoretical mitigation technique, crypto-ransomware techniques are still being proposed that utilise entropy calculations as part of their design [ 21 , 75 , 76 , 77 , 78 ].…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…One suggested approach is to further encode the encrypted files in a way as to reduce their overall entropy value, by for example, using base64 encoding. However, despite this theoretical mitigation technique, crypto-ransomware techniques are still being proposed that utilise entropy calculations as part of their design [ 21 , 75 , 76 , 77 , 78 ].…”
Section: Discussionmentioning
confidence: 99%
“…The NIST SP800-22 specification [ 37 , 40 , 45 ] from 2010 describes a suite of tests whose intended use is to evaluate the quality of random number generators [ 21 ]. The suite consists of 15 distinct tests, and which analyse various structural aspects of a byte sequence.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations