Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.3.521

Design and Implementation of a Cloud-Based Recovery System against Ransomware Attacks  

Ha, Sagnmin (Soongsil University)
Kim, Taehoon (Soongsil University)
Jung, Souhwan (Soongsil University)
Abstract
In this paper, we propose a protection solution against intelligent Ransomware attacks by encrypting not only source files but also backup files of external storage. The system is designed to automatically back up to the cloud server at the time of file creation to perform monitoring and blocking in case a specific process affects the original file. When client creates or saves a file, both process identifiers, parent process identifiers, and executable file hash values are compared and protected by the whitelist. The file format that is changed by another process is monitored and blocked to prevent from suspicious behavior. By applying the system proposed in this paper, it is possible to protect against damage caused by the modification or deletion of files by Ransomware.
Keywords
Malware; Ransomware; Vaccine;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Moore, Chris. "Detecting Ransomware with Honeypot Techniques." Cybersecurity and Cyberforensics Conference (CCC), IEEE, 2016, p77-81
2 "Threat analysis report for the first half of 2016" TrendMicro, 2016.
3 Ward, Mark. "Cryptolocker victims to get files back for free." BBC News, 2014.
4 Pathak, P. B., and Yeshwant Mahavidyalaya Nanded, "A dangerous trend of cybercrime: Ransomware growing challenge," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2016
5 Jaeyeon Moon and Younghyun Chang, "Ransomware Analysis and Method for Minimize the Damage," The Journal of the Convergence on Culture Technology, 2016, p79-85
6 Oh, Joo-Hyung, Im, Chae-Tae and Jeong, Hyun-Cheol. "Technical Trends and Response Methods of Drive-by Download," Communications of the Korean Institute of Information Scientists and Engineers, 28.
7 Richet and Jean-Loup, "Extortion on the Internet: the Rise of Crypto-Ransomware." Harvard University. Retrieved October, 2015
8 Nolen Scaife, Henry Carter, Patrick Traynor and Kevin R.B. Butler, "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data," International Conference on Distributed Computing Systems, 2016.
9 Richardson Ronny and Max North, "Ransomware: Evolution, Mitigation and Prevention." International Management Review 13.1, 2017
10 Miss. Harshada U. Salvi, and Mr. Ravidra V. Kerkar, "Ransomware: A Cyber Extortion," Asian Journal of Cenvergence in Technology, 2015.