Ransomware Encrypted Your Files but You Restored Them from Network Traffic

被引:0
|
作者
Berrueta, Eduardo [1 ]
Morato, Daniel [1 ,2 ]
Magana, Eduardo [1 ,2 ]
Izal, Mikel [1 ,2 ]
机构
[1] Univ Publ Navarra, Dept Elect Elect Engn & Commun, Pamplona, Spain
[2] Inst Smart Cities, Pamplona, Spain
来源
2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET) | 2018年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium and large companies maintain hardware or software probes that monitor the traffic in critical network links, in order to evaluate service performance, detect security breaches, account for network or service usage, etc. In this paper we suggest using the monitoring capabilities in one of these tools in order to keep a trace of the traffic between the users and the file server. Once the ransomware is detected, the lost files can be recovered from the traffic trace. This includes any user modifications posterior to the last snapshot of periodic backups. The paper explains the problems faced by the monitoring tool, which is neither the client nor the server of the file sharing operations. It also describes the data structures in order to process the actions of users that could be simultaneously working on the same file. A proof of concept software implementation was capable of successfully recovering the files encrypted by 18 different ransomware families.
引用
收藏
页数:7
相关论文
共 25 条