Ransomware Encrypted Your Files but You Restored Them from Network Traffic

被引:0
|
作者
Berrueta, Eduardo [1 ]
Morato, Daniel [1 ,2 ]
Magana, Eduardo [1 ,2 ]
Izal, Mikel [1 ,2 ]
机构
[1] Univ Publ Navarra, Dept Elect Elect Engn & Commun, Pamplona, Spain
[2] Inst Smart Cities, Pamplona, Spain
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium and large companies maintain hardware or software probes that monitor the traffic in critical network links, in order to evaluate service performance, detect security breaches, account for network or service usage, etc. In this paper we suggest using the monitoring capabilities in one of these tools in order to keep a trace of the traffic between the users and the file server. Once the ransomware is detected, the lost files can be recovered from the traffic trace. This includes any user modifications posterior to the last snapshot of periodic backups. The paper explains the problems faced by the monitoring tool, which is neither the client nor the server of the file sharing operations. It also describes the data structures in order to process the actions of users that could be simultaneously working on the same file. A proof of concept software implementation was capable of successfully recovering the files encrypted by 18 different ransomware families.
引用
收藏
页数:7
相关论文
共 22 条
  • [1] Your files have been encrypted: a crime script analysis of ransomware attacks
    Matthijsse, Sifra R.
    van't Hoff-de Goede, M. Susanne
    Leukfeldt, E. Rutger
    [J]. TRENDS IN ORGANIZED CRIME, 2023,
  • [2] Salvage the files you lost from your hard drive
    Steers, Kirk
    [J]. PC World (San Francisco, CA), 2005, 23 (05):
  • [3] On Learning Hierarchical Embeddings from Encrypted Network Traffic
    Wehner, Nikolas
    Ring, Markus
    Schueler, Joshua
    Hotho, Andreas
    Hossfeld, Tobias
    Seufert, Michael
    [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [4] Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic
    Berrueta, Eduardo
    Morato, Daniel
    Magana, Eduardo
    Izal, Mikel
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 209
  • [5] Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic
    Berrueta, Eduardo
    Morato, Daniel
    Magaña, Eduardo
    Izal, Mikel
    [J]. Expert Systems with Applications, 2022, 209
  • [6] Revealing QoE of Web Users from Encrypted Network Traffic
    Huet, Alexis
    Saverimoutou, Antoine
    Ben Houidi, Zied
    Shi, Hao
    Cai, Shengming
    Xu, Jinchun
    Mathieu, Bertrand
    Rossi, Dario
    [J]. 2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), 2020, : 28 - 36
  • [7] I Know What You Did On Your Smartphone: Inferring App Usage Over Encrypted Data Traffic
    Wang, Qinglong
    Yahyavi, Amir
    Kemme, Bettina
    He, Wenbo
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 433 - 441
  • [8] Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
    Loh, Frank
    Wamser, Florian
    Moldovan, Christian
    Zeidler, Bernd
    Tsilimantos, Dimitrios
    Valentin, Stefan
    Hossfeld, Tobias
    [J]. NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [9] AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic
    Taylor, Vincent F.
    Spolaor, Riccardo
    Conti, Mauro
    Martinovic, Ivan
    [J]. 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 439 - 454
  • [10] I still See You! Inferring Fitness Data from Encrypted Traffic of Wearables
    Kazlouski, Andrei
    Marchioro, Thomas
    Manifavas, Harry
    Markatos, Evangelos
    [J]. HEALTHINF: PROCEEDINGS OF THE 14TH INTERNATIONAL JOINT CONFERENCE ON BIOMEDICAL ENGINEERING SYSTEMS AND TECHNOLOGIES - VOL. 5: HEALTHINF, 2021, : 369 - 376