Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection

被引:33
作者
Al-rimy, Bander Ali Saleh [1 ]
Maarof, Mohd Aizaini [1 ]
Prasetyo, Yuli Adam [2 ]
Shaid, Syed Zainudeen Mohd [1 ]
Ariffin, Aswami Fadillah Mohd [3 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu 81310, Johor, Malaysia
[2] Telkom Univ, Sch Ind Engn, Bandung 40257, West Java, Indonesia
[3] CyberSecur Malaysia, Seri Kembangan 43300, Selangor, Malaysia
来源
INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING | 2018年 / 10卷 / 06期
关键词
Crypto-ransomware; malware; anomaly detection; Cryptography; Ensemble learning;
D O I
10.30880/ijie.2018.10.06.011
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Crypto-ransomware employs the cryptography to lock user personal files and demands ransom to release them. By utilizing several technological utilities like cyber-currency and cloud-based developing platforms, crypto-ransomware has gained high popularity among adversaries. Motivated by the monetary revenue, crypto-ransomware developers continuously produce many variants of such malicious programs to evade the detection. Consequently, the rate of crypto-ransomware novel attacks is continuously increasing. As such, it is imperative for detection solutions to be able to discover these novel attacks, also called zero-day attacks. While anomaly detection-based solutions are able to deal with this problem, they suffer the high rate of false alarms. Thus, this paper puts forward a detection model that incorporates anomaly with behavioral detection approaches. In this model, two types of detection estimators were built. The first type is an ensemble of behavioral-based classifiers whereas the second type is an anomaly-based estimator. The decisions of both types of estimators were combined using fusion technique. The proposed model is able to detect the novel attack while maintaining low false alarms rate. By applying the proposed model, the detection rate was increased from 96% to 99% and the false positive rate was as low as 2.4 %.
引用
收藏
页码:82 / 88
页数:7
相关论文
共 30 条
[1]  
Ahmadian MM, 2015, 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), P79, DOI 10.1109/ISCISC.2015.7387902
[2]   A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainuddin Mohd .
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2018, 5 :758-766
[3]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[4]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[5]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[6]  
Cabaj Krzysztof, 2015, Przeglad Elektrotechniczny, V91, P201, DOI 10.15199/48.2015.11.48
[7]   Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall [J].
Cabaj, Krzysztof ;
Mazurczyk, Wojciech .
IEEE NETWORK, 2016, 30 (06) :14-20
[8]  
Chen Z., 2017, P INT C RES AD CONV
[9]  
Christensen J.B., 2017, RANSOMWARE DETECTION
[10]   Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware [J].
Das, Sanjeev ;
Liu, Yang ;
Zhang, Wei ;
Chandramohan, Mahintham .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :289-302