skip to main content
10.1145/2976749.2989051acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat

Published:24 October 2016Publication History

ABSTRACT

Ransomware is one of the rising malwares in the crimeware family. It encrypts the user files and demands extortion money. From the perspective of an enterprise it is very crucial to detect and stop a ransomware attack. A well studied technique is to monitor file system behavior for suspicious activity. In this work we will show the gap in the existing state of art and describe a dynamic system which learns new behavior while under attack.

References

  1. Symantec. An ISTR Special Report: Ransomware and Businesses 2016. http://goo.gl/CjH90k, 2016.Google ScholarGoogle Scholar
  2. Washington Post. LA Hospital Pays Hackers After Ransomware Attack. https://goo.gl/IVx60L, 2016.Google ScholarGoogle Scholar
  3. Young et.al. Cryptovirology: Extortion-based security threats and countermeasures. In Symposium on Security and Privacy, pages 129--140. IEEE, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Scaife et.al. Cryptolock (and drop it):stopping ransomware attacks on user data. In International Conference on Distributed Computing Systems. IEEE, 2016.Google ScholarGoogle Scholar
  5. Kharraz et.al. Unveil: A large-scale, automated approach to detecting ransomware. USENIX Security Symposium, 2016.Google ScholarGoogle Scholar
  6. Ma et.al. Shadow attacks: automatically evading system-call-behavior based malware detection. Journal in Computer Virology, 8(1--2):1--13, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kharraz et.al. Cutting the gordian knot: a look under the hood of ransomware attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 3--24. Springer, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Shukla et.al. Poster: Winover enterprise dark data. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
          October 2016
          1924 pages
          ISBN:9781450341394
          DOI:10.1145/2976749

          Copyright © 2016 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 October 2016

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          CCS '16 Paper Acceptance Rate137of831submissions,16%Overall Acceptance Rate1,261of6,999submissions,18%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader