Cryptographic ransomware encryption detection: Survey

06/21/2023
by   Kenan Begovic, et al.
0

The ransomware threat has loomed over our digital life since 1989. Criminals use this type of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts in ransom. The damage ransomware causes ranges from monetary losses paid for ransom at best to endangering human lives. Cryptographic ransomware, where attackers encrypt the victim's data, stands as the predominant ransomware variant. The primary characteristics of these attacks have remained the same since the first ransomware attack. For this reason, we consider this a key factor differentiating ransomware from other cyber attacks, making it vital in tackling the threat of cryptographic ransomware. This paper proposes a cyber kill chain that describes the modern crypto-ransomware attack. The survey focuses on the Encryption phase as described in our proposed cyber kill chain and its detection techniques. We identify three main methods used in detecting encryption-related activities by ransomware, namely API and System calls, I/O monitoring, and file system activities monitoring. Machine learning (ML) is a tool used in all three identified methodologies, and some of the issues within the ML domain related to this survey are also covered as part of their respective methodologies. The survey of selected proposals is conducted through the prism of those three methodologies, showcasing the importance of detecting ransomware during pre-encryption and encryption activities and the windows of opportunity to do so. We also examine commercial crypto-ransomware protection and detection offerings and show the gap between academic research and commercial applications.

READ FULL TEXT

page 1

page 2

page 4

page 5

research
02/16/2021

Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey

Stealing attack against controlled information, along with the increasin...
research
07/28/2018

A Survey of Cyber Security Countermeasures Using Hardware Performance Counters

Cyber attacks and malware are now more prevalent than ever and the trend...
research
03/31/2021

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

The number of cyber attacks has increased tremendously in the last few y...
research
02/21/2022

Poisoning Attacks and Defenses on Artificial Intelligence: A Survey

Machine learning models have been widely adopted in several fields. Howe...
research
04/16/2020

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey

We are living in an era when online communication over social network se...
research
03/15/2022

Threat Detection for General Social Engineering Attack Using Machine Learning Techniques

This paper explores the threat detection for general Social Engineering ...
research
02/21/2021

A Ransomware Classification Framework Based on File-Deletion and File-Encryption Attack Structures

Ransomware has emerged as an infamous malware that has not escaped a lot...

Please sign up or login with your details

Forgot password? Click here to reset