Identifying File Interaction Patterns in Ransomware Behaviour

  • Grant L
  • Parkinson S
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malicious software (malware) has a rich history of causing significant challenges for both users and system developers alike. The development of different malware types is often resulting from criminal opportunity. The monetisation of ransomware, coupled with the continuous growing importance of user data, is resulting in ransomware becoming one of the most prominent forms of malware. Detecting and stopping a ransomware attack is challenging due to the large verity of different types, as well as the speed of new instances being developed. This results in static approaches (e.g. signature-based detection) ineffective at identifying all ransomware instances. This chapter investigates the behavioural characteristics of ransomware, and in particular focusses on interaction with the underlying file system. This study identifies that ransomware instances have unique behavioural patterns, which are significantly different from those of normal user interaction.

Cite

CITATION STYLE

APA

Grant, L., & Parkinson, S. (2018). Identifying File Interaction Patterns in Ransomware Behaviour (pp. 317–335). https://doi.org/10.1007/978-3-319-92624-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free