A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense

被引:19
作者
Min, Donghyun [1 ]
Ko, Yungwoo [2 ]
Walker, Ryan [3 ]
Lee, Junghee [4 ]
Kim, Youngjae [1 ]
机构
[1] Sogang Univ, Dept Comp Sci & Engn, Seoul 04107, South Korea
[2] TmaxSoft, Seoul, South Korea
[3] Booz Allen Hamilton, Global Def Grp, Mclean, VA 22102 USA
[4] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
关键词
Ransomware; Performance evaluation; Entropy; Encryption; Machine learning; Libraries; Engines; Ransomware attack; solid-state drive (SSD); storage security; storage system;
D O I
10.1109/TCAD.2021.3099084
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware is a growing concern in business and government because it causes immediate financial damages or loss of important data. There is a way to detect and block ransomware in advance, but evolved ransomware can still attack while avoiding detection. Another alternative is to back up the original data. However, existing backup solutions can be under the control of ransomware and backup copies can be destroyed by ransomware. Moreover, backup methods incur storage and performance overhead. In this article, we propose AMOEBA, a device-level backup solution that does not require additional storage for backup. AMOEBA is armed with: 1) a hardware accelerator to run content-based detection algorithms for ransomware detection at high speed and 2) a fine-grained backup control mechanism to minimize space overhead for data backup. For evaluations, we not only implemented AMOEBA using the Microsoft solid-state drive (SSD) simulator but also prototyped it on the OpenSSD-platform. Our extensive evaluations with real ransomware workloads show that AMOEBA has high ransomware detection accuracy with negligible performance overhead.
引用
收藏
页码:2038 / 2051
页数:14
相关论文
共 42 条
[31]  
OCZ Technology, 2012, PCI EXPR OCZ TECHN
[32]  
Park D., 2018, PROC USENIX C FILE S
[33]   RansomBlocker: a Low-Overhead Ransomware-Proof SSD [J].
Park, Jisung ;
Jung, Youngdon ;
Won, Jonghoon ;
Kang, Minji ;
Lee, Sungjin ;
Kim, Jihong .
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
[34]  
Rho E, 2018, PROCEEDINGS OF THE 16TH USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, P257
[35]   THE DESIGN AND IMPLEMENTATION OF A LOG-STRUCTURED FILE SYSTEM [J].
ROSENBLUM, M ;
OUSTERHOUT, JK .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1992, 10 (01) :26-52
[36]   CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data [J].
Scaife, Nolen ;
Carter, Henry ;
Traynor, Patrick ;
Butler, Kevin R. B. .
PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, :303-312
[37]  
Trend Micro, 2017, ER LIN RANS IMP SERV
[38]  
Vrable Michael., 2012, FAST, P19
[39]   Automated Systolic Array Architecture Synthesis for High Throughput CNN Inference on FPGAs [J].
Wei, Xuechao ;
Yu, Cody Hao ;
Zhang, Peng ;
Chen, Youxiang ;
Wang, Yuxin ;
Hu, Han ;
Liang, Yun ;
Cong, Jason .
PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
[40]  
Wilson V., 2019, 24 RECENT RANSOMWARE