RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph

被引:1
|
作者
Mei, Rui [1 ,2 ]
Yan, Han-Bing [3 ]
Han, Zhi-Hui [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Natl Comp Network Emergency Response Tech Team Co, Beijing 100029, Peoples R China
来源
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Ransomware analysis; Data provenance; Causality dependency graph;
D O I
10.1007/978-3-030-89137-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware analysis technology has been one of the most important research topics of cyber security. The recent surge in adoption of ransomware is rapidly changing the malware landscape. A large body of researches in security community have given us an understanding of ransomware individuals and families. However, to the best of our knowledge, there are currently few works that explore common and distinct malicious behaviors on large scale ransomware dataset. Our insight is that although the implementation of each ransomware vary widely, its malicious behaviors inevitably interact with the underlying operating system, which will be exposed and captured by system event tracing mechanism. In this paper, we propose a novel ransomware analysis pipeline, a system provenance graph based approach for better understanding the ransomware's behaviors. Then we leverage the analysis framework to analyze on large scale ransomware dataset and present some interesting findings on diverse ransomware and their families. Furthermore, our analysis on ransomware also reveals that system provenance graph is an ideal tool, with strong abstract expression ability and relatively high efficiency.
引用
收藏
页码:252 / 267
页数:16
相关论文
共 50 条
  • [1] Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
    Miao, Hui
    Deshpande, Amol
    [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 1710 - 1713
  • [2] Understanding Ethereum via Graph Analysis
    Chen, Ting
    Zhu, Yuxiao
    Li, Zihao
    Chen, Jiachi
    Li, Xiaoqi
    Luo, Xiapu
    Lin, Xiaodong
    Zhange, Xiaosong
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1484 - 1492
  • [3] Understanding Ethereum via Graph Analysis
    Chen, Ting
    Li, Zihao
    Zhu, Yuxiao
    Chen, Jiachi
    Luo, Xiapu
    Lui, John Chi-Shing
    Lin, Xiaodong
    Zhang, Xiaosong
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (02)
  • [4] Quine: A Temporal Graph System for Provenance Storage and Analysis
    Wright, Ryan
    [J]. PROVENANCE AND ANNOTATION OF DATA AND PROCESSES, IPAW 2018, 2018, 11017 : 177 - 180
  • [5] Ransomware behavior attack construction via graph theory approach
    Rosli, Muhammad Safwan
    Abdullah, Raihana Syahirah
    Yassin, Warusia
    Faizal, M.A.
    Wan Nur Fatihah Wan Mohd Zaki
    [J]. International Journal of Advanced Computer Science and Applications, 2020, (02): : 487 - 496
  • [6] Ransomware Behavior Attack Construction via Graph Theory Approach
    Rosli, Muhammad Safwan
    Abdullah, Raihana Syahirah
    Yassin, Warusia
    Faizal, M. A.
    Zaki, Wan Nur Fatihah Wan Mohd
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 487 - 496
  • [7] Review of threat discovery and forensic analysis based on system provenance graph
    Leng, Tao
    Cai, Lijun
    Yu, Aimin
    Zhu, Ziyuan
    Ma, Jian'gang
    Li, Chaofei
    Niu, Ruicheng
    Meng, Dan
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 172 - 188
  • [8] Visual Causality: Investigating Graph Layouts for Understanding Causal Processes
    Vo, Dong-Bach
    Lazarova, Kristina
    Purchase, Helen C.
    McCann, Mark
    [J]. DIAGRAMMATIC REPRESENTATION AND INFERENCE, DIAGRAMS 2020, 2020, 12169 : 332 - 347
  • [9] Obscuring Provenance Confidential Information via Graph Transformation
    Hussein, Jamal
    Moreau, Luc
    Sassone, Vladimiro
    [J]. TRUST MANAGEMENT IX, 2015, 454 : 109 - 125
  • [10] CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis
    Mei, Rui
    Yan, Han-Bing
    Han, Zhi-Hui
    Jiang, Jian-Chun
    [J]. 2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 28 - 39