Enhancing File Entropy Analysis to Improve Machine Learning Detection Rate of Ransomware

被引:11
作者
Hsu, Chia-Ming [1 ]
Yang, Chia-Cheng [1 ]
Cheng, Han-Hsuan [1 ]
Setiasabda, Paul E. [1 ]
Leu, Jenq-Shiou [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect & Comp Engn, Taipei 10607, Taiwan
关键词
Ransomware; Cryptography; Feature extraction; Entropy; Support vector machines; Encryption; Analytical models; Machine learning; ransomware; entropy; security;
D O I
10.1109/ACCESS.2021.3114148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal data on a computer and transmitting it through the Internet. Cybersecurity will be an important issue that everyone continues to pay attention to. One of the most serious problems recently is the prevalence of ransomware, especially crypto-ransomware. Unlike ordinary attacks, crypto-ransomware does not control the victim's computer and steal important data. It focuses on encrypting all data and asking victims to provide ransom to decrypt the data. Currently, many studies focus on various aspects of ransomware, including file-based, behavior-based, and network-based ransomware detection method, and use machine learning to build detection models. In addition to the above research, we found that attackers have begun to develop a new method to encrypt data. It will not only increase the speed of data encryption but also reduce the detection rate in the existing detection system. In any case, we are still facing ransomware dangers, as it is hard to recognize and forestall ransomware executing obscure malicious programs. In other words, user data will be sabotaged as soon as the computer cannot detect the ransomware. To solve the problem, detecting files instead of detecting the executable program might be helpful to establish the backup system immediately before ransomware encrypts all of the user files. We analyze the 22 formats of the encrypted files, extract the specific features and use the Support Vector Machine to distinguish between encrypted and unencrypted files. Conducted analysis results confirm that our method has better performance and a higher detection rate, reaching 85.17%. (Where the detection rate of SVM kernel Trick (Poly) exceeds 92%).
引用
收藏
页码:138345 / 138351
页数:7
相关论文
共 22 条
  • [1] Ransomware Prediction Using Supervised Learning Algorithms
    Adamu, Umaru
    Awan, Irfan
    [J]. 2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, : 57 - 63
  • [2] Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
  • [3] Binary Analysis with Architecture and Code Section Detection Using Supervised Machine Learning
    Beckman, Bryan
    Haile, Jed
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, : 152 - 156
  • [4] Bin Qin, 2020, 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), P162, DOI 10.1109/ICBAIE49996.2020.00041
  • [5] Machine Learning-Based Detection of Ransomware Using SDN
    Cusack, Greg
    Michel, Oliver
    Keller, Eric
    [J]. PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18), 2018, : 1 - 6
  • [6] Elkhawas AI, 2018, 2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), P252
  • [7] Guo H., 2020, IEEE ACCESS, V8
  • [8] Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor
    Hirano, Manabu
    Kobayashi, Ryotaro
    [J]. 2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 393 - 398
  • [9] Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems
    Lee, Kyungroul
    Lee, Sun-Young
    Yim, Kangbin
    [J]. IEEE ACCESS, 2019, 7 : 110205 - 110215
  • [10] A Consistently-Executing Graph-Based Approach for Malware Packer Identification
    Li, Xingwei
    Shan, Zheng
    Liu, Fudong
    Chen, Yihang
    Hou, Yifan
    [J]. IEEE ACCESS, 2019, 7 : 51620 - 51629