The Inadequacy of Entropy-Based Ransomware Detection

被引:39
|
作者
McIntosh, Timothy [1 ]
Jang-Jaccard, Julian [1 ]
Watters, Paul [2 ]
Susnjak, Teo [1 ]
机构
[1] Massey Univ, Auckland 0632, New Zealand
[2] La Trobe Univ, Bundoora, Vic 3086, Australia
关键词
Ransomware; Entropy; Encryption; File integrity;
D O I
10.1007/978-3-030-36802-9_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many state-of-the-art anti-ransomware implementations monitoring file system activities choose to monitor file entropy-based changes to determine whether the changes may have been committed by ransomware, or to distinguish between compression and encryption operations. However, such detections can be victims of spoofing attacks, when attackers manipulate the entropy values in the expected range during the attacks. This paper explored the limitations of entropy-based ransomware detection on several different file types. We demonstrated how to use Base64-Encoding and Distributed Non-Selective Partial Encryption to manipulate entropy values and to bypass current entropy-based detection mechanisms. By exploiting this vulnerability, attackers can avoid entropy-based detection or degrade detection performance. We recommended that the practice of relying on file entropy change thresholds to detect ransomware encryption should be deprecated.
引用
收藏
页码:181 / 189
页数:9
相关论文
共 50 条
  • [41] Entropy-Based Internet Traffic Anomaly Detection: A Case Study
    Berezinski, Przemyslaw
    Pawelec, Jozef
    Malowidzki, Marek
    Piotrowski, Rata'
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON DEPENDABILITY AND COMPLEX SYSTEMS DEPCOS-RELCOMEX, 2014, 286 : 47 - 58
  • [42] Entropy-based optimal sensor location for structural damage detection
    Beck, JL
    Papadimitriou, C
    Au, SK
    Vanik, MW
    SMART SYSTEMS FOR BRIDGES, STRUCTURES, AND HIGHWAYS, 1998, 3325 : 161 - 172
  • [43] An Entropy-based VoIP Flooding Attacks Detection and Prevention System
    Zargar, Reihaneh Haji Mahdizdeh
    Moghaddam, Mohammad Hossein Yaghmaee
    2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2014, : 691 - 696
  • [44] Wavelet Singular Entropy-Based Islanding Detection in Distributed Generation
    Samui, Ankita
    Samantaray, S. R.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2013, 28 (01) : 411 - 418
  • [45] A Novel Backdoor Detection Approach Using Entropy-Based Measures
    Surendrababu, Hema Karnam
    Nagaraj, Nithin
    IEEE ACCESS, 2024, 12 : 114057 - 114072
  • [46] Entropy-Based Automation Detection on Twitter Using DNA Profiling
    Gilmary R.
    Venkatesan A.
    SN Computer Science, 4 (6)
  • [47] Challenging Entropy-based Anomaly Detection and Diagnosis in Cellular Networks
    Fiadino, P.
    D'Alconzo, A.
    Schiavone, M.
    Casas, P.
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 87 - 88
  • [48] An Entropy-Based Class Assignment Detection Approach for RDF Data
    Barati, Molood
    Bai, Quan
    Liu, Qing
    PRICAI 2018: TRENDS IN ARTIFICIAL INTELLIGENCE, PT II, 2018, 11013 : 412 - 420
  • [49] Entropy-Based Approach for the Detection of Changes in Arabic Newspapers' Content
    Bernikova, Olga
    Granichin, Oleg
    Lemberg, Dan
    Redkin, Oleg
    Volkovich, Zeev
    ENTROPY, 2020, 22 (04)
  • [50] An entropy-based sensor selection algorithm for structural damage detection
    Tjen, Jimmy
    Smarra, Francesco
    D'Innocenzo, Alessandro
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2020, : 1566 - 1571