Detecting Ransomware Encryption with File Signatures and Machine Learning Models

被引:1
作者
Duignan, Michael [1 ]
Schukat, Michael [2 ]
Barrett, Enda [2 ]
机构
[1] Atlantic Technol Univ, Dept Comp Sci & Appl Phys, Galway, Ireland
[2] Univ Galway, Dept Informat Technol, Galway, Ireland
来源
2023 34TH IRISH SIGNALS AND SYSTEMS CONFERENCE, ISSC | 2023年
关键词
Ransomware; encryption; Magic Numbers; Xorist; Chaos; Conti; Shannon entropy; machine learning; CLASSIFICATION;
D O I
10.1109/ISSC59246.2023.10162047
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study presents an analysis of the use of machine learning models in the identification and classification of ransomware encrypted files, differentiating them from standard encrypted or compressed files, and non-encrypted files (referred to as goodware). The study utilized a robust dataset of approximately 159,897 files, categorized into goodware, Chaos, Conti, and Xorist strains, and applied five machine learning models: Logistic Regression, Linear Discriminant Analysis, K-Nearest Neighbor, Naive Bayes, and Classification and Regression Trees to this dataset. The models were trained using an array of data points, including file headers and footers, entropy, Chi Squared, and file extensions. The analysis revealed high accuracy rates of between 97% and 100% in distinguishing ransomware encrypted files from other file types, demonstrating the importance of file extensions as a key determinant in this process. The study also draws attention to the increasing prevalence and complexity of ransomware strains, specifically those which do not alter file extensions, thereby posing additional challenges to identification and classification efforts. The research suggests further investigation and study into a wider array of ransomware strains and a more extensive range of file types. Special emphasis is recommended on strains that do not modify file extensions, as understanding these could significantly enhance the efficiency and effectiveness of machine learning models in ransomware detection.
引用
收藏
页数:5
相关论文
共 23 条
[1]  
Abuse.ch, US
[2]  
Acronis Security Team, 2022, AXLOCKER RANS DOESN
[3]   Data Augmentation in Classification and Segmentation: A Survey and New Strategies [J].
Alomar, Khaled ;
Aysel, Halil Ibrahim ;
Cai, Xiaohao .
JOURNAL OF IMAGING, 2023, 9 (02)
[4]  
[Anonymous], 2021, UNIT 42 RANSOMWARE T
[5]   ShieldFS: A Self-healing, Ransomware-aware Filesystem [J].
Continella, Andrea ;
Guagnelli, Alessandro ;
Zingaro, Giovanni ;
De Pasquale, Giulio ;
Barenghi, Alessandro ;
Zanero, Stefano ;
Maggi, Federico .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :336-347
[6]  
Coveware, 2021, RANSOMWARE ATTACK VE
[7]  
CrowdStrike, 2021, GLOB THREAT REP 2021, P75
[8]   NapierOne: A modern mixed file data set alternative to Govdocs1 [J].
Davies, Simon R. ;
Macfarlane, Richard ;
Buchanan, William J. .
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 40
[9]   Differential area analysis for ransomware attack detection within mixed file datasets [J].
Davies, Simon R. ;
Macfarlane, Richard ;
Buchanan, William J. .
COMPUTERS & SECURITY, 2021, 108
[10]   Evaluation of live forensic techniques in ransomware attack mitigation [J].
Davies, Simon R. ;
Macfarlane, Richard ;
Buchanan, William J. .
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 33 (33)