UPDATE: Zenodo migration postponed to Oct 13 from 06:00-08:00 UTC. Read the announcement.

Conference paper Open Access

On Deception-Based Protection Against Cryptographic Ransomware

Alper Genç, Ziya; Lenzini, Gabriele; Sgandurra, Daniele

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-ofconcept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them.

Files (516.0 kB)
Name Size
22-On Deception-Based Protection Against Cryptographic Ransomware.pdf
md5:e3bdef0b767959838fb711e6fa5a2cbf
516.0 kB Download
233
707
views
downloads
Views 233
Downloads 707
Data volume 364.8 MB
Unique views 216
Unique downloads 665

Share

Cite as