Visible to the public How to Make Efficient Decoy Files for Ransomware Detection?

TitleHow to Make Efficient Decoy Files for Ransomware Detection?
Publication TypeConference Paper
Year of Publication2017
AuthorsLee, Jeonghwan, Lee, Jinwoo, Hong, Jiman
Conference NameProceedings of the International Conference on Research in Adaptive and Convergent Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5027-3
KeywordsAccess Control, composability, Decoy, File I/O, Metrics, pubcrawl, ransomware, resilience, Resiliency
Abstract

Recently, Ransomware has been rapidly increasing and is becoming far more dangerous than other common malware types. Unlike previous versions of Ransomware that infect email attachments or access certain sites, the new Ransomware, such as WannaCryptor, corrupts data even when the PC is connected to the Internet. Therefore, many studies are being conducted to detect and defend Ransomware. However, existing studies on Ransomware detection cannot effectively detect and defend the new Ransomware because it detects Ransomware using signature databases or monitoring specific activities of processes. In this paper, we propose a method to make decoy files for detecting Ransomwares efficiently. The proposed method is based on the analysis of the behaviors of existing Ransomwares at the source code level.

URLhttps://dl.acm.org/citation.cfm?doid=3129676.3129713
DOI10.1145/3129676.3129713
Citation Keylee_how_2017