Adaptive Ransomware Detection Using Similarity-Preserving Hashing

被引:0
|
作者
Almajali, Anas [1 ,2 ]
Elmosalamy, Adham [2 ]
Safwat, Omar [2 ]
Abouelela, Hassan [2 ]
机构
[1] Hashemite Univ, Dept Comp Engn, Zarqa 13115, Jordan
[2] Amer Univ Sharjah, Dept Comp Sci & Engn, Sharjah, U Arab Emirates
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 20期
关键词
ransomware; Blake3; adaptive-integrity mesh hashing; ransomware detection; malware;
D O I
10.3390/app14209548
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Crypto-ransomware is a type of ransomware that encrypts the victim's files and demands a ransom to return the files. This type of attack has been on the rise in recent years, as it offers a lucrative business model for threat actors. Research into developing solutions for detecting and halting the spread of ransomware is vast, and it uses different approaches. Some approaches rely on analyzing system calls made via processes to detect malicious behavior, while other methods focus on the affected files by creating a file integrity monitor to detect rapid and abnormal changes in file hashes. In this paper, we present a novel approach that utilizes hashing and can accommodate large files and dynamically take into account the amount of change within each file. Mainly, our approach relies on dividing each file into partitions and then performing selective hashing on those partitions to rapidly detect encrypted partitions due to ransomware. Our new approach addresses the main weakness of a previous implementation that relies on hashing files, not file partitions. This new implementation strikes a balance between the detection time and false positives based on the partition size and the threshold of partition changes before issuing an alert.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Multimodal Similarity-Preserving Hashing
    Masci, Jonathan
    Bronstein, Michael M.
    Bronstein, Alexander M.
    Schmidhuber, Juergen
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2014, 36 (04) : 824 - 830
  • [2] Similarity-Preserving Hashing for Stock Analysis
    Inphadung, Nongmai
    Kamonsantiroj, Suwatchai
    Pipanmaekaporn, Luepol
    PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON E-BUSINESS AND APPLICATIONS (ICEBA 2019), 2019, : 94 - 99
  • [3] Similarity-Preserving Linkage Hashing for Online Image Retrieval
    Lin, Mingbao
    Ji, Rongrong
    Chen, Shen
    Sun, Xiaoshuai
    Lin, Chia-Wen
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 : 5289 - 5300
  • [4] Asymmetric similarity-preserving discrete hashing for image retrieval
    Xiuxiu Ren
    Xiangwei Zheng
    Lizhen Cui
    Gang Wang
    Huiyu Zhou
    Applied Intelligence, 2023, 53 : 12114 - 12131
  • [5] Video Retrieval with Similarity-Preserving Deep Temporal Hashing
    Shen, Ling
    Hong, Richang
    Zhang, Haoran
    Tian, Xinmei
    Wang, Meng
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2019, 15 (04)
  • [6] Asymmetric similarity-preserving discrete hashing for image retrieval
    Ren, Xiuxiu
    Zheng, Xiangwei
    Cui, Lizhen
    Wang, Gang
    Zhou, Huiyu
    APPLIED INTELLIGENCE, 2023, 53 (10) : 12114 - 12131
  • [7] Multi-bit quantisation for similarity-preserving hashing
    Su, Liang Liang
    Tang, Jun
    Liang, Dong
    Zhu, Ming
    IET COMPUTER VISION, 2018, 12 (05) : 616 - 622
  • [8] DGA Detection Using Similarity-Preserving Bloom Encodings
    Nitz, Lasse
    Mandal, Avikarsha
    PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, : 116 - 120
  • [9] Similarity-Preserving Knowledge Distillation
    Tung, Frederick
    Mori, Greg
    2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 1365 - 1374
  • [10] Unsupervised Deep Hashing With Fine-Grained Similarity-Preserving Contrastive Learning for Image Retrieval
    Cao, Hu
    Huang, Lei
    Nie, Jie
    Wei, Zhiqiang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (05) : 4095 - 4108