Ransomware Behavior Attack Construction via Graph Theory Approach

被引:0
|
作者
Rosli, Muhammad Safwan [1 ]
Abdullah, Raihana Syahirah [1 ]
Yassin, Warusia [1 ]
Faizal, M. A. [1 ]
Zaki, Wan Nur Fatihah Wan Mohd [1 ]
机构
[1] Univ Teknikal Malaysia Melaka, Ctr Adv Comp Technol, Fak Teknol Maklumat & Komunikasi, Durian Tunggal 76100, Melaka, Malaysia
关键词
Ransomware; behavior analysis; graph theory; file activity system; Neo4j; SOFTWARE-DEFINED NETWORKING; MALWARE; THREAT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware detection, malware behavior need to be prioritized and analyzed in order to recognize malware attack pattern. Although the current state-of-art solutions and frameworks used dynamic analysis approach such as machine learning that provide more impact rather than static approach, but there is not any approachable way in representing the analysis especially a detection that relies on malware behavior. Therefore, this paper proposed a graph theory approach which is analysis of the ransomware behavior that can be visualized into graph-based pattern. An experiment has been conducted with ten ransomware samples for malware analysis and verified using VirusTotal. Then, file system among features were selected in the experiment as a medium to understand the behavior of ransomware using data capturing tools. After that, the result of the analysis was visualized in a graph pattern based on Neo4j which is graph database tool. By using graph as a base, the discussion has been made to recognize each type of ransomware that acts differently in the file system and analyze which node that have the most impact during analysis part.
引用
收藏
页码:487 / 496
页数:10
相关论文
共 50 条
  • [1] Ransomware behavior attack construction via graph theory approach
    Rosli, Muhammad Safwan
    Abdullah, Raihana Syahirah
    Yassin, Warusia
    Faizal, M.A.
    Wan Nur Fatihah Wan Mohd Zaki
    [J]. International Journal of Advanced Computer Science and Applications, 2020, (02): : 487 - 496
  • [2] Multistage Game Theoretical Approach for Ransomware Attack and Defense
    Zhang, Chunming
    Luo, Fengji
    Ranzi, Gianluca
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2800 - 2811
  • [3] The Construction and Application of Network Attack Graph
    Wang Yonggang
    Miao Yi
    Yang Yang
    Chen Zhong
    Hu Jianbin
    [J]. CHINA COMMUNICATIONS, 2009, 6 (04) : 71 - 74
  • [4] RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph
    Mei, Rui
    Yan, Han-Bing
    Han, Zhi-Hui
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 252 - 267
  • [5] A Novel Approach for Attack Tree to Attack Graph Transformation
    Schiele, Nathan Daniel
    Gadyatskaya, Olga
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 74 - 90
  • [6] Graph Adversarial Attack via Rewiring
    Ma, Yao
    Wang, Suhang
    Derr, Tyler
    Wu, Lingfei
    Tang, Jiliang
    [J]. KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1161 - 1169
  • [7] A Novel Approach for Analysis of Attack Graph
    Yousefi, Mehdi
    Mtetwa, Nhamo
    Zhang, Yan
    Tianfield, Huaglory
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 7 - 12
  • [8] A Reinforcementearning Approach for Attack Graph Analysis
    Yousefi, Mehdi
    Mtetwa, Nhamo
    Zhang, Yan
    Tianfield, Huaglory
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 212 - 217
  • [9] Detecting falsified timestamps in evidence graph via attack graph
    Zhang, Yuqiang
    He, Jingsha
    Xu, Jing
    [J]. 2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 369 - 374
  • [10] An Integrated Network Scanning Tool for Attack Graph Construction
    Cheng, Feng
    Roschke, Sebastian
    Meinel, Christoph
    [J]. ADVANCES IN GRID AND PERVASIVE COMPUTING, 2011, 6646 : 138 - 147