Adaptive Ransomware Detection Using Similarity-Preserving Hashing

被引:0
作者
Almajali, Anas [1 ,2 ]
Elmosalamy, Adham [2 ]
Safwat, Omar [2 ]
Abouelela, Hassan [2 ]
机构
[1] Hashemite Univ, Dept Comp Engn, Zarqa 13115, Jordan
[2] Amer Univ Sharjah, Dept Comp Sci & Engn, Sharjah, U Arab Emirates
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 20期
关键词
ransomware; Blake3; adaptive-integrity mesh hashing; ransomware detection; malware;
D O I
10.3390/app14209548
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Crypto-ransomware is a type of ransomware that encrypts the victim's files and demands a ransom to return the files. This type of attack has been on the rise in recent years, as it offers a lucrative business model for threat actors. Research into developing solutions for detecting and halting the spread of ransomware is vast, and it uses different approaches. Some approaches rely on analyzing system calls made via processes to detect malicious behavior, while other methods focus on the affected files by creating a file integrity monitor to detect rapid and abnormal changes in file hashes. In this paper, we present a novel approach that utilizes hashing and can accommodate large files and dynamically take into account the amount of change within each file. Mainly, our approach relies on dividing each file into partitions and then performing selective hashing on those partitions to rapidly detect encrypted partitions due to ransomware. Our new approach addresses the main weakness of a previous implementation that relies on hashing files, not file partitions. This new implementation strikes a balance between the detection time and false positives based on the partition size and the threshold of partition changes before issuing an alert.
引用
收藏
页数:17
相关论文
共 29 条
  • [1] Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection
    Abbasi, Muhammad Shabbir
    Al-Sahaf, Harith
    Mansoori, Masood
    Welch, Ian
    [J]. APPLIED SOFT COMPUTING, 2022, 121
  • [2] Al-Muntaser B., 2023, Int. J. Adv. Comput. Sci. Appl, V14, DOI [10.14569/IJACSA.2023.0140636, DOI 10.14569/IJACSA.2023.0140636]
  • [3] Almajali Anas, 2022, 2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA), P328, DOI 10.1109/ICECTA57148.2022.9990424
  • [4] Anghel M., 2019, Cryptol. Eprint Arch
  • [5] Arora P., 2023, P 5 INT C INF MAN MA, DOI [10.1145/3647444.3652439, DOI 10.1145/3647444.3652439]
  • [6] A Comprehensive Review on Malware Detection Approaches
    Aslan, Omer
    Samet, Refik
    [J]. IEEE ACCESS, 2020, 8 : 6249 - 6271
  • [7] Investigation of Possibilities to Detect Malware Using Existing Tools
    Aslan, Omer
    Samet, Refik
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1277 - 1284
  • [8] Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
  • [9] A survey of malware detection using deep learning
    Bensaoud, Ahmed
    Kalita, Jugal
    Bensaoud, Mahmoud
    [J]. MACHINE LEARNING WITH APPLICATIONS, 2024, 16
  • [10] Ransomware early detection: A survey
    Cen, Mingcan
    Jiang, Frank
    Qin, Xingsheng
    Jiang, Qinghong
    Doss, Robin
    [J]. COMPUTER NETWORKS, 2024, 239