Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption
Abstract
:1. Introduction
- To prevent infection from ransomware and minimize damage, existing ransomware detection methods were intensively analyzed, and the attacker’s position was considered to derive effective countermeasures. Through this, we propose a method to neutralize a more sophisticated ransomware detection method. This study is expected to provide results that, combined with previous studies, could help develop a method in the future that is used to counteract the technology that neutralizes ransomware detection technology.
- By intensively analyzing existing ransomware detection-neutralization methods, the weaknesses of previous studies were derived, and three neutralization methods to overcome those weaknesses were proposed.
- To propose a method of neutralizing the entropy measurement-based ransomware detection method, we analyzed the applicability of format-preserving encryption that could overcome the difficulties of applying cryptography algorithms in general and conform to the demands of the attacker. Finally, we proposed a sophisticated neutralization method.
2. Prior Knowledge and Related Works
2.1. Prior Knowledge
2.1.1. Information Entropy
2.1.2. Ciphertext Characteristics
2.1.3. Correlation between Entropy and Number Expression Range
2.1.4. Format-Preserving Encryption
2.2. Related Works
3. Limitation Analysis of Previous Studies and Experimental Configuration
3.1. Limitation Analysis of Previous Studies
3.2. Dataset Configuration and Experiment Goals
3.2.1. Dataset Configuration
3.2.2. Experimental Goals
4. Proposed Neutralization Method
4.1. Neutralization Methodology Using Format-Preserving Encryption
4.1.1. Byte Split
4.1.2. Binary to ASCII
4.1.3. Radix Conversion
4.2. Derivation of the Optimal Neutralization Technique
5. Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Kok, S.H.; Abdullah, A.; Jhanjhi, N.Z.; Supramaniam, M. Ransomware, Threat and Detection Techniques: A Review. Int. J. Comput. Sci. Netw. Secur. 2019, 19, 136–146. [Google Scholar]
- Mohurle, S.; Patil, M. A brief study of wannacry threat: Ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 2017, 8, 1938–1940. [Google Scholar]
- Sophos, “The State of Ransomeware 2022”. A Sophos Whitepaper, April 2022. Available online: https://www.sophos.com/en-us/content/state-of-ransomware: (accessed on 25 November 2022).
- Cabaj, K.; Gregorczyk, M.; Mazurczyk, W. Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics. arXiv, 2016; arXiv:1611.08294. [Google Scholar] [CrossRef]
- Paik, J.-Y.; Choi, J.-H.; Jin, R.; Wang, J.; Cho, E.-S. A Storage-Level Detection Mechanism against Crypto-Ransomware. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15 October 2018; ACM: New York, NY, USA, 2018; pp. 2258–2260. [Google Scholar]
- Chen, J.; Wang, C.; Zhao, Z.; Chen, K.; Du, R.; Ahn, G.J. Uncovering the face of android ransomware: Characterization and real-time detection. IEEE Trans. Inf. Forensics Secur. 2017, 13, 1286–1300. [Google Scholar] [CrossRef]
- Akbanov, M.; Vassilakis, V.G.; Logothetis, M.D. Ransomware detection and mitigation using software-defined networking: The case of WannaCry. Comput. Electr. Eng. 2019, 76, 111–121. [Google Scholar] [CrossRef]
- Lin, J. Divergence measures based on the Shannon entropy. IEEE Trans. Inf. Theory 1991, 37, 145–151. [Google Scholar] [CrossRef]
- Vassilev, A.; Hall, T.A. The importance of entropy to information security. Computer 2014, 47, 78–81. [Google Scholar] [CrossRef]
- Dolev, D.; Dwork, C.; Naor, M. Nonmalleable Cryptography. SIAM J. Comput. 2000, 30, 391–437. [Google Scholar] [CrossRef]
- Richardson, R.; Director, C. CSI computer crime and security survey. Comput. Secur. Inst. 2008, 1, 1–30. [Google Scholar]
- Shi, J.; Chen, S.; Lu, Y.; Feng, Y.; Shi, R.; Yang, Y.; Li, J. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network. Sci. Rep. 2020, 10, 2107. [Google Scholar] [CrossRef] [PubMed]
- Lee, K.; Lee, S.-Y.; Yim, K. Machine learning based file entropy analysis for ransomware detection in backup systems. IEEE Access 2019, 7, 110205–110215. [Google Scholar] [CrossRef]
- Lee, J.; Lee, K. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms. Entropy 2022, 24, 239. [Google Scholar] [CrossRef] [PubMed]
- Jung, S.; Won, Y. Ransomware detection method based on context-aware entropy analysis. Soft Comput. 2018, 22, 6731–6740. [Google Scholar] [CrossRef]
- Bellare, M.; Ristenpart, T.; Rogaway, P.; Stegers, T. Format-preserving encryption. In International Workshop on Selected Areas in Cryptography; Springer: Berlin/Heidelberg, Germany, 2009; pp. 295–312. [Google Scholar]
- Agbeyibor, R.; Butts, J.; Grimaila, M.; Mills, R. Evaluation of format-preserving encryption algorithms for critical infrastructure protection. In Proceedings of the International Conference on Critical Infrastructure Protection, Arlington, VA, USA, 17–19 March 2014; Butts, J., Shenoi, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; Volume 441, pp. 245–261. [Google Scholar]
- Jang, W.; Lee, S.-Y. A format-preserving encryption FF1 FF3–1 using lightweight block ciphers LEA and SPECK. In Proceedings of the 35th Annual ACM Symposium on Applied Computing, New York, NY, USA, 30 March 2020; pp. 369–375. [Google Scholar]
- Ju-Seong, K.; Kwak, J. Accuracy Enhancement of Determining File Encryption Status through Divided Shannon Entropy. KIPS 2018, 25, 279–281. [Google Scholar]
- Davies, S.R.; Macfarlane, R.; Buchanan, W.J. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy 2022, 24, 1503. [Google Scholar] [CrossRef]
- Timothy, M.; Julian, J.; Paul, W.; Teo, S. The inadequacy of entropy-based ransomware detection. In Communications in Computer and Information Science; Springer: Sydney, Australia, 2019; pp. 181–189. [Google Scholar]
File Type | File Format | Number of Files |
---|---|---|
Text file | csv | 800 |
txt | 800 | |
System file | sys | 800 |
dll | 450 | |
Document file | 450 | |
doc | 450 | |
docx | 150 | |
ppt | 450 | |
pptx | 150 | |
xls | 150 | |
xlsx | 30 | |
Image file | jpg | 450 |
Webpage file | html | 800 |
Compressed file | zip | 5 |
Source code file | c | 150 |
cpp | 150 |
Technique | Number of Representable Numbers | Range of Representable Numbers | Change in Ciphertext Size | Description | |
---|---|---|---|---|---|
Byte Split | 16 | 0x00~0x0 F | ×2 |
| |
BinaryToASCII | 16 | 0x30~0x39 (Decimal) 0x61~0x66 (Alphabet) | ×2 |
| |
Radix Conversion | Radix2 | 2 | 0x00~0x01 | ×3.56 |
|
Radix3 | 3 | 0x00~0x02 | ×2.25 | ||
Radix4 | 4 | 0x00~0x03 | ×1.81 | ||
Radix5 | 5 | 0x00~0x04 | ×1.56 | ||
Radix6 | 6 | 0x00~0x05 | ×1.37 | ||
Radix7 | 7 | 0x00~0x06 | ×1.25 | ||
Radix8 | 8 | 0x00~0x07 | ×1.18 | ||
Radix10 | 10 | 0x00~0x09 | ×1.06 | ||
Radix16 | 16 | 0x00~0x0F | ×1 |
File Format | Plain Text | Byte Split | Binary to Ascii | Radix Conversion | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
2 | 3 | 4 | 5 | 6 | 7 | 8 | 10 | 16 | ||||
CSV | 4.43359 | 3.99924 (+0.43434) | 1.99992 (+2.43366) | 3.16960 (+1.26399) | 3.99923 (+0.43435) | 4.64247 (−0.20888) | 5.16760 (−0.73401) | 5.61130 (−1.17772) | 5.99520 (−1.56162) | 6.63543 (−2.20184) | 7.97352 (−3.53993) | |
TXT | 4.18490 | 3.99846 (+0.18643) | 1.99985 (+1.01573) | 3.16917 (+1.01573) | 3.99834 (+0.18656) | 4.64099 (−0.45609) | 5.16556 (−0.98066) | 5.60713 (−1.42224) | 5.99043 (−1.80553) | 6.62661 (−2.44171) | 7.94958 (−3.76468) | |
DLL | 5.98047 | 3.99986 (+1.98062) | 1.99997 (+2.81066) | 3.16981 (+2.81066) | 3.99978 (+1.98069) | 4.64343 (+1.33704) | 5.16936 (+0.81111) | 5.61394 (+0.36653) | 5.99884 (−0.01836) | 6.67259 (−0.69212) | 7.99505 (−2.01458) | |
SYS | 6.64239 | 3.99814 (+2.64425) | 1.99982 (+3.47322) | 3.16918 (+3.47322) | 3.99804 (+2.64435) | 4.64005 (+2.00235) | 5.16379 (+1.47861) | 5.60583 (+1.03656) | 5.98736 (+0.65503) | 6.62082 (+0.02157) | 7.92800 (−1.28561) | |
7.56255 | 3.99992 (+3.56264) | 1.99997 (+4.39272) | 3.16983 (+4.39272) | 3.99983 (+3.56272) | 4.64354 (+2.91901) | 5.16947 (+2.39308) | 5.61408 (+1.94847) | 5.99914 (+1.56342) | 6.64250 (+0.92005) | 7.99701 (−0.43445) | ||
DOC | 4.47150 | 3.99992 (+0.47158) | 1.99981 (+1.30254) | 3.16897 (+1.30254) | 3.99832 (+0.47318) | 4.64133 (−0.16983) | 5.16727 (−0.69577) | 5.61165 (−1.14015) | 5.99561 (−1.52411) | 6.63978 (−2.16828) | 7.99721 (−3.52570) | |
DOCX | 7.53530 | 3.99942 (+3.53588) | 1.99993 (+4.36558) | 3.16972 (+4.36558) | 3.99959 (+3.53571) | 4.64286 (+2.89245) | 5.16858 (+2.36673) | 5.61261 (+1.92269) | 5.99702 (+1.53829) | 6.63872 (+0.89658) | 7.98427 (−0.44897) | |
PPT | 6.74016 | 3.99998 (+2.74018) | 1.99997 (+3.57032) | 3.16984 (+3.57032) | 3.99989 (+2.74027) | 4.64365 (+2.09651) | 5.16858 (+1.57159) | 5.61261 (+1.12755) | 5.99959 (+0.74057) | 6.64333 (+0.09683) | 7.99927 (−1.12911) | |
PPTX | 7.85963 | 3.99998 (+3.85965) | 1.99999 (+4.68972) | 3.16991 (+4.68972) | 3.99997 (+3.85966) | 4.64379 (+3.21584) | 5.16984 (+2.68979) | 5.61461 (+2.24502) | 5.99986 (+1.85977) | 6.64365 (+1.21599) | 7.99945 (−0.13981) | |
XLS | 3.89697 | 3.99987 (−0.10290) | 1.99977 (+0.72828) | 3.16869 (+0.72828) | 3.99770 (−0.10072) | 4.64041 (−0.74343) | 5.16610 (−1.26913) | 5.61040 (−1.71343) | 5.99346 (−2.09649) | 6.63766 (−2.74069) | 7.99521 (−4.09824) | |
XLSX | 7.36146 | 3.99974 (+3.36175) | 7.99184 (+4.19169) | 3.16977 (+4.19169) | 3.99970 (+3.36176) | 4.64331 (+2.71815) | 5.16921 (+2.19225) | 5.61361 (+1.74785) | 5.99844 (+1.36302) | 6.64132 (+0.72014) | 7.99184 (−0.63039) | |
JPG | 7.83111 | 3.99965 (+3.38146) | 1.99996 (+4.66133) | 3.16978 (+4.66133) | 3.99964 (+3.83147) | 4.64318 (+3.18792) | 5.16883 (+2.66228) | 5.61321 (+2.21790) | 5.99780 (+1.83331) | 6.64006 (+1.19105) | 7.98816 (−0.15705) | |
HTML | 5.13085 | 3.99907 (+1.13178) | 1.99990 (+1.96132) | 3.16952 (+1.96132) | 3.99902 (+1.13182) | 4.64218 (+0.48867) | 5.16675 (−0.03590) | 5.61022 (−0.47937) | 5.99357 (−0.86273) | 6.63271 (−1.50187) | 7.96442 (−2.83358) | |
ZIP | 7.98678 | 3.99998 (+3.98679) | 2.00000 (+4.81686) | 3.16992 (+4.81686) | 3.99999 (+3.98679) | 4.64382 (+3.34295) | 5.16988 (+2.81690) | 5.61465 (+2.37212) | 5.99992 (+1.98685) | 6.64375 (+1.34302) | 7.99967 (−0.01290) | |
C | 5.31892 | 3.99806 (+1.32086) | 1.99977 (+2.14983) | 3.16909 (+2.14983) | 3.99787 (+1.32106) | 4.64029 (+0.67863) | 5.16410 (+0.15483) | 5.60583 (−0.28691) | 5.98767 (−0.66875) | 6.62328 (−1.30436) | 7.93207 (−2.61315) | |
CPP | 4.94971 | 3.99615 (+0.95356) | 1.99969 (+1.78154) | 3.16816 (+1.78154) | 3.99459 (+0.95512) | 4.63443 (+0.31528) | 5.15712 (−0.20741) | 5.59549 (−0.64578) | 5.97598 (−1.02627) | 6.60374 (−1.65403) | 7.89892 (−2.94921) |
Entropy Threshold | File Type | File Format | Previous Study (Best Encoding Method) | Proposed Method (Format-Preserving Encryption) |
---|---|---|---|---|
0.3 | Text file | CSV | 13% | 49% |
TXT | 0% | 16% | ||
System file | DLL | 30% | ||
SYS | 25% | 13% | ||
Document file | 3% | 53% | ||
DOC | 6% | 23% | ||
DOCX | 0% | 47% | ||
PPT | 3% | 14% | ||
PPTX | 0% | 85% | ||
XLS | 1% | 25% | ||
XLSX | 0% | 43% | ||
Image file | JPG | 0% | 90% | |
Web page file | HTML | 0% | 76% | |
Compressed file | ZIP | 0% | 100% | |
Source code file | C | 0% | 63% | |
CPP | 0% | 33% |
Entropy Threshold | File Type | File Format | Previous Study (Best Encoding Method) | Proposed Method (Format-Preserving Encryption) |
---|---|---|---|---|
0.4 | Text file | CSV | 18% | 63% |
TXT | 0% | 31% | ||
System file | DLL | 32% | ||
SYS | 30% | 21% | ||
Document file | 3% | 63% | ||
DOC | 10% | 25% | ||
DOCX | 0% | 58% | ||
PPT | 6% | 17% | ||
PPTX | 0% | 93% | ||
XLS | 2% | 37% | ||
XLSX | 0% | 48% | ||
Image file | JPG | 0% | 91% | |
Web page file | HTML | 2% | 86% | |
Compressed file | ZIP | 0% | 100% | |
Source code file | C | 0% | 99% | |
CPP | 0% | 43% |
Entropy Threshold | File Type | File Format | Previous Study (Best Encoding Method) | Proposed Method (Format-Preserving Encryption) |
---|---|---|---|---|
0.5 | Text file | CSV | 31% | 69% |
TXT | 0% | 48% | ||
System file | DLL | 36% | ||
SYS | 35% | 26% | ||
Document file | 6% | 72% | ||
DOC | 13% | 28% | ||
DOCX | 0% | 67% | ||
PPT | 8% | 21% | ||
PPTX | 1% | 97% | ||
XLS | 4% | 48% | ||
XLSX | 0% | 57% | ||
Image file | JPG | 0% | 91% | |
Web page file | HTML | 6% | 92% | |
Compressed file | ZIP | 0% | 100% | |
Source code file | C | 12% | 99% | |
CPP | 0% | 65% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, J.; Lee, S.-Y.; Yim, K.; Lee, K. Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption. Sensors 2023, 23, 4728. https://doi.org/10.3390/s23104728
Lee J, Lee S-Y, Yim K, Lee K. Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption. Sensors. 2023; 23(10):4728. https://doi.org/10.3390/s23104728
Chicago/Turabian StyleLee, Jaehyuk, Sun-Young Lee, Kangbin Yim, and Kyungroul Lee. 2023. "Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption" Sensors 23, no. 10: 4728. https://doi.org/10.3390/s23104728