Ransomware Behavior Attack Construction via Graph Theory Approach

被引:0
|
作者
Rosli, Muhammad Safwan [1 ]
Abdullah, Raihana Syahirah [1 ]
Yassin, Warusia [1 ]
Faizal, M. A. [1 ]
Zaki, Wan Nur Fatihah Wan Mohd [1 ]
机构
[1] Univ Teknikal Malaysia Melaka, Ctr Adv Comp Technol, Fak Teknol Maklumat & Komunikasi, Durian Tunggal 76100, Melaka, Malaysia
关键词
Ransomware; behavior analysis; graph theory; file activity system; Neo4j; SOFTWARE-DEFINED NETWORKING; MALWARE; THREAT;
D O I
10.14569/ijacsa.2020.0110262
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware detection, malware behavior need to be prioritized and analyzed in order to recognize malware attack pattern. Although the current state-of-art solutions and frameworks used dynamic analysis approach such as machine learning that provide more impact rather than static approach, but there is not any approachable way in representing the analysis especially a detection that relies on malware behavior. Therefore, this paper proposed a graph theory approach which is analysis of the ransomware behavior that can be visualized into graph-based pattern. An experiment has been conducted with ten ransomware samples for malware analysis and verified using VirusTotal. Then, file system among features were selected in the experiment as a medium to understand the behavior of ransomware using data capturing tools. After that, the result of the analysis was visualized in a graph pattern based on Neo4j which is graph database tool. By using graph as a base, the discussion has been made to recognize each type of ransomware that acts differently in the file system and analyze which node that have the most impact during analysis part.
引用
收藏
页码:487 / 496
页数:10
相关论文
共 50 条
  • [31] THEORY OF POLYMER BEHAVIOR UNDER SHOCK ATTACK
    PASTINE, DJ
    [J]. BULLETIN OF THE AMERICAN PHYSICAL SOCIETY, 1969, 14 (12): : 1164 - &
  • [32] CATEGORICAL APPROACH TO THE CONSTRUCTION OF FUZZY GRAPH GRAMMARS
    Parasyuk, I. N.
    Yershov, S. V.
    [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2006, 42 (04) : 558 - 569
  • [33] A Constellation Graph based Approach for Ontology Construction
    Liu, Yili
    Yang, Yang
    [J]. ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2540 - 2545
  • [34] A Knowledge Graph Construction Approach for Legal Domain
    Dong, Biao
    Yu, Haoze
    Li, Haisheng
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2021, 28 (02): : 357 - 362
  • [35] A Cocktail Approach to Practical Call Graph Construction
    Cai, Yuandao
    Zhang, Charles
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [36] Categorical approach to the construction of fuzzy graph grammars
    Parasyuk I.N.
    Yershov S.V.
    [J]. Cybernetics and Systems Analysis, 2006, 42 (4) : 570 - 581
  • [37] An approach to neutrosophic graph theory with applications
    Sahin, Ridvan
    [J]. SOFT COMPUTING, 2019, 23 (02) : 569 - 581
  • [38] An approach to neutrosophic graph theory with applications
    Rıdvan Şahin
    [J]. Soft Computing, 2019, 23 : 569 - 581
  • [39] Translating Lorca: a graph theory approach
    Meara, Paul
    [J]. SOCIOLINGUISTIC STUDIES, 2010, 4 (03) : 615 - 633
  • [40] An approach of security risk evaluation based on the Bayesian attack graph
    Hui, Wang
    Fuwang, Chen
    Yunfeng, Wang
    [J]. Open Cybernetics and Systemics Journal, 2015, 9 (01): : 953 - 960