Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration

被引:0
作者
Mcintosh, Timothy [1 ,2 ]
Susnjak, Teo [3 ]
Liu, Tong [3 ]
Xu, Dan [4 ]
Watters, Paul [5 ]
Liu, Dongwei [6 ]
Hao, Yaqi [2 ]
Ng, Alex [7 ]
Halgamuge, Malka [1 ]
机构
[1] RMIT Univ, Melbourne, Australia
[2] Cyberoo Pty Ltd, Surry Hills, Australia
[3] Massey Univ, Auckland, New Zealand
[4] ANZ Bank, Melbourne, Australia
[5] Cyberstron Pty Ltd, Ballarat, Vic, Australia
[6] Coles Grp Ltd, Hawthorn E, Australia
[7] Federat Univ, Ballarat, Vic, Australia
关键词
Ransomware; ransomware detection; ransomware defense; ransomware prevention; MANAGEMENT; BEHAVIOR; BACKUP; MODEL;
D O I
10.1145/3691340
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or destroying valuable user data and causing numerous disruptions to victims. The severity of the ransomware endemic has generated research interest from both the academia and the industry. However, many studies held stereotypical assumptions about ransomware, used unverified, outdated, and limited self-collected ransomware samples, and did not consider government strategies, industry guidelines, or cyber intelligence. We observed that ransomware no longer exists simply as an executable file or limits to encrypting files (data loss); data exfiltration (data breach) is the new norm, espionage is an emerging theme, and the industry is shifting focus from technical advancements to cyber governance and resilience. We created a ransomware innovation adoption curve, critically evaluated 212 academic studies published during 2020 and 2023, and cross-verified them against various government strategies, industry reports, and cyber intelligence on ransomware. We concluded that many studies were becoming irrelevant to the contemporary ransomware reality and called for the redirection of ransomware research to align with the continuous ransomware evolution in the industry. We proposed to address data exfiltration as priority over data encryption, to consider ransomware in a business-practical manner, and recommended research collaboration with the industry.
引用
收藏
页数:40
相关论文
共 237 条
[1]   Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection [J].
Abbasi, Muhammad Shabbir ;
Al-Sahaf, Harith ;
Mansoori, Masood ;
Welch, Ian .
APPLIED SOFT COMPUTING, 2022, 121
[2]   Particle Swarm Optimization: A Wrapper-Based Feature Selection Method for Ransomware Detection and Classification [J].
Abbasi, Muhammad Shabbir ;
Al-Sahaf, Harith ;
Welch, Ian .
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2020, 2020, 12104 :181-196
[3]   High Performance Classification Model to Identify Ransomware Payments for Heterogeneous Bitcoin Networks [J].
Abu Al-Haija, Qasem ;
Alsulami, Abdulaziz A. .
ELECTRONICS, 2021, 10 (17)
[4]  
Adamov Alexander, 2020, IEEE E W DES TEST S, P1
[5]  
Ahmad Masaad Naji Masaad, 2022, 2022 International Conference on Data Analytics for Business and Industry (ICDABI), P773, DOI 10.1109/ICDABI56818.2022.10041528
[6]   Peeler: Profiling Kernel-Level Events to Detect Ransomware [J].
Ahmed, Muhammad Ejaz ;
Kim, Hyoungshick ;
Camtepe, Seyit ;
Nepal, Surya .
COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 :240-260
[7]   Mitigating adversarial evasion attacks of ransomware using ensemble learning [J].
Ahmed, Usman ;
Lin, Jerry Chun-Wei ;
Srivastava, Gautam .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
[8]   A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT [J].
Ahmed, Yahye Abukar ;
Huda, Shamsul ;
Al-rimy, Bander Ali Saleh ;
Alharbi, Nouf ;
Saeed, Faisal ;
Ghaleb, Fuad A. ;
Ali, Ismail Mohamed .
SUSTAINABILITY, 2022, 14 (03)
[9]   A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection [J].
Ahmed, Yahye Abukar ;
Kocer, Baris ;
Huda, Shamsul ;
Al-rimy, Bander Ali Saleh ;
Hassan, Mohammad Mehedi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167
[10]   Ransomware-Resilient Self-Healing XML Documents [J].
Al-Dwairi, Mahmoud ;
Shatnawi, Ahmed S. ;
Al-Khaleel, Osama ;
Al-Duwairi, Basheer .
FUTURE INTERNET, 2022, 14 (04)