A behavioural in-depth analysis of ransomware infection

被引:15
作者
Lemmou, Yassine [1 ]
Lanet, Jean-Louis [2 ]
Souidi, El Mamoun [1 ]
机构
[1] Mohammed V Univ Rabat, Fac Sci, Rabat, Morocco
[2] INRIA, LHS, PEC, Rennes, France
关键词
D O I
10.1049/ise2.12004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware is a type of malware that has spread rapidly over the last 4 years, causing significant damage, especially in Windows environments. It is designed to encrypt or block victim's data, including documents, backups, and databases, unless a ransom is paid. In this study, the authors present the results of their research on Windows crypto-ransomware during the last 3 years by exploring and discussing the relevant ransomware behaviours. The results of this study can be used to identify or to detect the ransomware. Indeed, these behaviours were extracted from in-depth manual analysis of more than 20 ransomware families, including the known and the recent families. In addition, some extracted behaviours were automatically searched for more than 200 different ransomware collected during 2019.
引用
收藏
页码:38 / 58
页数:21
相关论文
共 44 条
  • [1] Alzahrani A, 2018, INT CONF ELECTRO INF, P892, DOI 10.1109/EIT.2018.8500161
  • [2] Anandarajan M., 2019, Practical Text Analytics: Maximizing the Value of Text Data
  • [3] Aresu M, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P128, DOI 10.1109/MALWARE.2015.7413693
  • [4] Cabaj Krzysztof., 2016, CoRR
  • [5] Chen J., 2018, IEEE T INF FORENSICS, V13
  • [6] Cohen F., 1986, THESIS
  • [7] ShieldFS: A Self-healing, Ransomware-aware Filesystem
    Continella, Andrea
    Guagnelli, Alessandro
    Zingaro, Giovanni
    De Pasquale, Giulio
    Barenghi, Alessandro
    Zanero, Stefano
    Maggi, Federico
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 336 - 347
  • [8] An Approach to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis
    Cosma, Georgina
    Joy, Mike
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2012, 61 (03) : 379 - 394
  • [9] Cuzzocrea A., 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), P1
  • [10] Enck W, P 20 USENIX SEC S