Cargando…

A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms

Ransomware consists of malicious codes that restrict users from accessing their own files while demanding a ransom payment. Since the advent of ransomware, new and variant ransomwares have caused critical damage around the world, thus prompting the study of detection and prevention technologies agai...

Descripción completa

Detalles Bibliográficos
Autores principales: Lee, Jaehyuk, Lee, Kyungroul
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8871499/
https://www.ncbi.nlm.nih.gov/pubmed/35205533
http://dx.doi.org/10.3390/e24020239
_version_ 1784657010318376960
author Lee, Jaehyuk
Lee, Kyungroul
author_facet Lee, Jaehyuk
Lee, Kyungroul
author_sort Lee, Jaehyuk
collection PubMed
description Ransomware consists of malicious codes that restrict users from accessing their own files while demanding a ransom payment. Since the advent of ransomware, new and variant ransomwares have caused critical damage around the world, thus prompting the study of detection and prevention technologies against ransomware. Ransomware encrypts files, and encrypted files have a characteristic of increasing entropy. Due to this characteristic, a defense technology has emerged for detecting ransomware-infected files by measuring the entropy of clean and encrypted files based on a derived entropy threshold. Accordingly, attackers have applied a method in which entropy does not increase even if the files are encrypted, such that the ransomware-infected files cannot be detected through changes in entropy. Therefore, if the attacker applies a base64 encoding algorithm to the encrypted files, files infected by ransomware will have a low entropy value. This can eventually neutralize the technology for detecting files infected from ransomware based on entropy measurement. Therefore, in this paper, we propose a method to neutralize ransomware detection technologies using a more sophisticated entropy measurement method by applying various encoding algorithms including base64 and various file formats. To this end, we analyze the limitations and problems of the existing entropy measurement-based ransomware detection technologies using the encoding algorithm, and we propose a more effective neutralization method of ransomware detection technologies based on the analysis results.
format Online
Article
Text
id pubmed-8871499
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-88714992022-02-25 A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms Lee, Jaehyuk Lee, Kyungroul Entropy (Basel) Article Ransomware consists of malicious codes that restrict users from accessing their own files while demanding a ransom payment. Since the advent of ransomware, new and variant ransomwares have caused critical damage around the world, thus prompting the study of detection and prevention technologies against ransomware. Ransomware encrypts files, and encrypted files have a characteristic of increasing entropy. Due to this characteristic, a defense technology has emerged for detecting ransomware-infected files by measuring the entropy of clean and encrypted files based on a derived entropy threshold. Accordingly, attackers have applied a method in which entropy does not increase even if the files are encrypted, such that the ransomware-infected files cannot be detected through changes in entropy. Therefore, if the attacker applies a base64 encoding algorithm to the encrypted files, files infected by ransomware will have a low entropy value. This can eventually neutralize the technology for detecting files infected from ransomware based on entropy measurement. Therefore, in this paper, we propose a method to neutralize ransomware detection technologies using a more sophisticated entropy measurement method by applying various encoding algorithms including base64 and various file formats. To this end, we analyze the limitations and problems of the existing entropy measurement-based ransomware detection technologies using the encoding algorithm, and we propose a more effective neutralization method of ransomware detection technologies based on the analysis results. MDPI 2022-02-04 /pmc/articles/PMC8871499/ /pubmed/35205533 http://dx.doi.org/10.3390/e24020239 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Lee, Jaehyuk
Lee, Kyungroul
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
title A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
title_full A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
title_fullStr A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
title_full_unstemmed A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
title_short A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms
title_sort method for neutralizing entropy measurement-based ransomware detection technologies using encoding algorithms
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8871499/
https://www.ncbi.nlm.nih.gov/pubmed/35205533
http://dx.doi.org/10.3390/e24020239
work_keys_str_mv AT leejaehyuk amethodforneutralizingentropymeasurementbasedransomwaredetectiontechnologiesusingencodingalgorithms
AT leekyungroul amethodforneutralizingentropymeasurementbasedransomwaredetectiontechnologiesusingencodingalgorithms
AT leejaehyuk methodforneutralizingentropymeasurementbasedransomwaredetectiontechnologiesusingencodingalgorithms
AT leekyungroul methodforneutralizingentropymeasurementbasedransomwaredetectiontechnologiesusingencodingalgorithms