The Inadequacy of Entropy-Based Ransomware Detection

被引:39
|
作者
McIntosh, Timothy [1 ]
Jang-Jaccard, Julian [1 ]
Watters, Paul [2 ]
Susnjak, Teo [1 ]
机构
[1] Massey Univ, Auckland 0632, New Zealand
[2] La Trobe Univ, Bundoora, Vic 3086, Australia
关键词
Ransomware; Entropy; Encryption; File integrity;
D O I
10.1007/978-3-030-36802-9_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many state-of-the-art anti-ransomware implementations monitoring file system activities choose to monitor file entropy-based changes to determine whether the changes may have been committed by ransomware, or to distinguish between compression and encryption operations. However, such detections can be victims of spoofing attacks, when attackers manipulate the entropy values in the expected range during the attacks. This paper explored the limitations of entropy-based ransomware detection on several different file types. We demonstrated how to use Base64-Encoding and Distributed Non-Selective Partial Encryption to manipulate entropy values and to bypass current entropy-based detection mechanisms. By exploiting this vulnerability, attackers can avoid entropy-based detection or degrade detection performance. We recommended that the practice of relying on file entropy change thresholds to detect ransomware encryption should be deprecated.
引用
收藏
页码:181 / 189
页数:9
相关论文
共 50 条
  • [1] Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations
    Bang, Jiseok
    Kim, Jeong Nyeo
    Lee, Seungkwang
    SENSORS, 2024, 24 (05)
  • [2] Reliability of Entropy-based Malware Detection as a Single Method in Preventing Ransomware Attacks
    Alkan, Abdulkerim Oguzhan
    Dogru, Ibrahim Alper
    Atacak, Ismail
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024,
  • [3] Entropy-Based Anomaly Detection in a Network
    Ajay Shankar Shukla
    Rohit Maurya
    Wireless Personal Communications, 2018, 99 : 1487 - 1501
  • [4] Entropy-based fade modeling and detection
    San Pedro Wandelmer, Jose
    Dominguez Cabrerizo, Sergio
    Denis, Nicolas
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2007, 23 (04) : 1265 - 1280
  • [5] Entropy-based Network Anomaly Detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 334 - 340
  • [6] Entropy-based concept shift detection
    Vorburger, Peter
    Bernstein, Abraham
    ICDM 2006: SIXTH INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2006, : 1113 - +
  • [7] ENTROPY-BASED RAIN DETECTION AND REMOVAL
    Jha, Rajib Kumar
    Mohanty, Sraban Kumar
    Maitrey, Anand
    2013 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND EMBEDDED SYSTEMS (CARE-2013), 2013,
  • [8] An Entropy-based TextWatermarking Detection Method
    Lu, Yijian
    Liu, Aiwei
    Yu, Dianzhi
    Li, Jingjing
    King, Irwin
    PROCEEDINGS OF THE 62ND ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, VOL 1: LONG PAPERS, 2024, : 11724 - 11735
  • [9] Entropy-Based Anomaly Detection in a Network
    Shukla, Ajay Shankar
    Maurya, Rohit
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (04) : 1487 - 1501
  • [10] Entropy-based outlier detection using spark
    Feng, Guilan
    Li, Zhengnan
    Zhou, Wengang
    Dong, Shi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 409 - 419