RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware

被引:0
|
作者
Md. Ahsan Ayub
Ambareen Siraj
Bobby Filar
Maanak Gupta
机构
[1] Tennessee Tech University,Department of Computer Science
[2] Sublime Security,undefined
[3] Inc.,undefined
关键词
Dynamic Analysis; Machine Learning; Ransomware; Static Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Ransomware attacks have captured news headlines worldwide for the last few years due to their criticality and intensity. Ransomware-as-a-service (RaaS) kits are aiding adversaries to launch such powerful attacks with little to no technical knowledge. Eventually, with the successful progression of ransomware attacks, organizations suffer financial loss, and their proprietary-based sensitive digital assets end up on the dark web for sale. Due to the severity of this situation, security researchers are seen to conduct static and dynamic analysis research for ransomware research. Both analyses have advantages and disadvantages, and prompt ransomware detection is expected to stop the irreversible encryption process. This research proposes a novel static-informed dynamic analysis approach, RWArmor, which includes the knowledge of the already-trained machine learning models based on static features to improve the ransomware detection capabilities during dynamic analysis. The effectiveness of our approach is evaluated by predicting a novel/unknown ransomware between 30 and 120 seconds of its execution. The random forest algorithm is utilized to accomplish this task and tested against 215 active cryptographic Windows ransomware collected between 2014 and 2022. Based on our empirical findings, our method achieves 97.67%, 92.38%, and 86.42% accuracy within 120, 60, and 30 seconds of behavioral logs, respectively.
引用
收藏
页码:533 / 556
页数:23
相关论文
共 50 条
  • [21] Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions
    Urooj, Umara
    Al-rimy, Bander Ali Saleh
    Zainal, Anazida
    Ghaleb, Fuad A.
    Rassam, Murad A.
    APPLIED SCIENCES-BASEL, 2022, 12 (01):
  • [22] Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis
    Zhang, Huan
    Zhao, Lixin
    Yu, Aimin
    Cai, Lijun
    Meng, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6113 - 6127
  • [23] Integrated static and dynamic analysis for malware detection
    Shijo, P. V.
    Salim, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 804 - 811
  • [24] Androshield: Automated android applications vulnerability detection, a hybrid static and dynamic analysis approach
    Amin A.
    Eldessouki A.
    Magdy M.T.
    Abdeen N.
    Hindy H.
    Hegazy I.
    Information (Switzerland), 2019, 10 (10):
  • [25] AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
    Amin, Amr
    Eldessouki, Amgad
    Magdy, Menna Tullah
    Abdeen, Nouran
    Hindy, Hanan
    Hegazy, Islam
    INFORMATION, 2019, 10 (10)
  • [26] An Approach to Static-Dynamic Software Analysis
    Gonzalez-de-Aledo, Pablo
    Sanchez, Pablo
    Huuck, Ralf
    FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS, (FTSCS 2015), 2016, 596 : 225 - 240
  • [27] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Hwang, Jinsoo
    Kim, Jeankyung
    Lee, Seunghwan
    Kim, Kichang
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2597 - 2609
  • [28] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Jinsoo Hwang
    Jeankyung Kim
    Seunghwan Lee
    Kichang Kim
    Wireless Personal Communications, 2020, 112 : 2597 - 2609
  • [29] XRan: Explainable deep learning-based ransomware detection using dynamic analysis
    Gulmez, Sibel
    Kakisim, Arzu Gorgulu
    Sogukpinar, Ibrahim
    COMPUTERS & SECURITY, 2024, 139
  • [30] A comparison of static, dynamic, and hybrid analysis for malware detection
    Damodaran A.
    Troia F.D.
    Visaggio C.A.
    Austin T.H.
    Stamp M.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (1) : 1 - 12