Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

02/15/2022
by   Eduardo Berrueta, et al.
0

Ransomware is considered as a significant threat for most enterprises since the past few years. In scenarios wherein users can access all files on a shared server, one infected host can lock the access to all shared files. We propose a tool to detect ransomware infection based on file-sharing traffic analysis. The tool monitors the traffic exchanged between the clients and the file servers and using machine learning techniques it searches for patterns in the traffic that betray ransomware actions while reading and overwriting files. The proposal is designed to work for clear text and for encrypted file-sharing protocols. We compare three machine learning models and choose the best for validation. We train and test the detection model using more than 70 ransomware binaries from 26 different strains and more than 2500 hours of not infected traffic from real users. The results reveal that the proposed tool can detect all ransomware binaries, including those not used in training phase (unseen). This paper provides a validation of the algorithm by studying the false positive rate and the amount of information from user files that the ransomware could encrypt before being detected.

READ FULL TEXT
research
12/16/2019

Proof of file access in a private P2P network using blockchain

While sharing files in a peer-to-peer (P2P) system significantly increas...
research
06/28/2021

Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

The threat from ransomware continues to grow both in the number of affec...
research
03/03/2021

Robust PDF Files Forensics Using Coding Style

Identifying how a file has been created is often interesting in security...
research
01/26/2022

Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication

We consider the problem of sharing sensitive or valuable files across us...
research
10/24/2022

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Ransomware is a malicious class of software that utilises encryption to ...
research
07/25/2019

Decrypting live SSH traffic in virtual environments

Decrypting and inspecting encrypted malicious communications may assist ...
research
09/02/2022

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Command and Control (C2) communication is a key component of any structu...

Please sign up or login with your details

Forgot password? Click here to reset