Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall

被引:91
作者
Cabaj, Krzysztof [1 ,2 ]
Mazurczyk, Wojciech [3 ]
机构
[1] Warsaw Univ Technol, Fac Elect & Informat Technol, PL-00661 Warsaw, Poland
[2] Warsaw Univ Technol, PL-00661 Warsaw, Poland
[3] Warsaw Univ Technol, Inst Telecommun, PL-00661 Warsaw, Poland
来源
IEEE NETWORK | 2016年 / 30卷 / 06期
关键词
Software defined networking;
D O I
10.1109/MNET.2016.1600110NM
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, different forms of ransomware are increasingly threatening Internet users. Modern ransomware encrypts important user data, and it is only possible to recover it once a ransom has been paid. In this article we show how software-defined networking can be utilized to improve ransomware mitigation. In more detail, we analyze the behavior of popular ransomware - CryptoWall - and, based on this knowledge, propose two real-time mitigation methods. Then we describe the design of an SDN-based system, implemented using OpenFlow, that facilitates a timely reaction to this threat, and is a crucial factor in the case of crypto ransomware. What is important is that such a design does not significantly affect overall network performance. Experimental results confirm that the proposed approach is feasible and efficient.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 11 条
[1]  
[Anonymous], 12 C DET INTR MALW V
[2]  
[Anonymous], MEET TOX RANS REST U
[3]  
[Anonymous], 2015, Internet Security Threat Report
[4]  
Cabaj Krzysztof, 2015, Przeglad Elektrotechniczny, V91, P201, DOI 10.15199/48.2015.11.48
[5]  
Europol, 2015, INT ORG CRIM THREAT
[6]   Malware Detection for Mobile Devices Using Software-Defined Networking [J].
Jin, Ruofan ;
Wang, Bing .
2013 SECOND GENI RESEARCH AND EDUCATIONAL EXPERIMENT WORKSHOP (GREE), 2013, :81-88
[7]   Software-Defined Networking: A Comprehensive Survey [J].
Kreutz, Diego ;
Ramos, Fernando M. V. ;
Verissimo, Paulo Esteves ;
Rothenberg, Christian Esteve ;
Azodolmolky, Siamak ;
Uhlig, Steve .
PROCEEDINGS OF THE IEEE, 2015, 103 (01) :14-76
[8]  
Mehdi SA, 2011, LECT NOTES COMPUT SC, V6961, P161, DOI 10.1007/978-3-642-23644-0_9
[9]  
Savage K., 2015, The evolution of ransomware, Symantec Security Response
[10]  
Shin S, 2012, I C NETWORK PROTOCOL