• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于勒索软件加密文件识别的熵计算方法比较

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.

作者信息

Davies Simon R, Macfarlane Richard, Buchanan William J

机构信息

Blockpass ID Lab, School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK.

出版信息

Entropy (Basel). 2022 Oct 21;24(10):1503. doi: 10.3390/e24101503.

DOI:10.3390/e24101503
PMID:37420524
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9601406/
Abstract

Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many crypto-ransomware detection techniques is to monitor file system activity and attempt to identify encrypted files being written to disk, often using a file's entropy as an indicator of encryption. However, often in the description of these techniques, little or no discussion is made as to why a particular entropy calculation technique is selected or any justification given as to why one technique is selected over the alternatives. The Shannon method of entropy calculation is the most commonly-used technique when it comes to file encryption identification in crypto-ransomware detection techniques. Overall, correctly encrypted data should be indistinguishable from random data, so apart from the standard mathematical entropy calculations such as Chi-Square (χ2), Shannon Entropy and Serial Correlation, the test suites used to validate the output from pseudo-random number generators would also be suited to perform this analysis. The hypothesis being that there is a fundamental difference between different entropy methods and that the best methods may be used to better detect ransomware encrypted files. The paper compares the accuracy of 53 distinct tests in being able to differentiate between encrypted data and other file types. The testing is broken down into two phases, the first phase is used to identify potential candidate tests, and a second phase where these candidates are thoroughly evaluated. To ensure that the tests were sufficiently robust, the NapierOne dataset is used. This dataset contains thousands of examples of the most commonly used file types, as well as examples of files that have been encrypted by crypto-ransomware. During the second phase of testing, 11 candidate entropy calculation techniques were tested against more than 270,000 individual files-resulting in nearly three million separate calculations. The overall accuracy of each of the individual test's ability to differentiate between files encrypted using crypto-ransomware and other file types is then evaluated and each test is compared using this metric in an attempt to identify the entropy method most suited for encrypted file identification. An investigation was also undertaken to determine if a hybrid approach, where the results of multiple tests are combined, to discover if an improvement in accuracy could be achieved.

摘要

勒索软件是一类恶意软件,它利用加密技术对系统可用性实施攻击。目标数据会一直保持加密状态,并被攻击者控制,直到满足赎金要求。许多加密勒索软件检测技术常用的一种方法是监控文件系统活动,并尝试识别写入磁盘的加密文件,通常将文件的熵作为加密的一个指标。然而,在这些技术的描述中,往往很少或根本没有讨论为什么选择特定的熵计算技术,也没有给出选择一种技术而不是其他技术的任何理由。在加密勒索软件检测技术中,涉及文件加密识别时,香农熵计算方法是最常用的技术。总体而言,正确加密的数据应该与随机数据无法区分,所以除了诸如卡方检验(χ2)、香农熵和序列相关性等标准数学熵计算方法外,用于验证伪随机数生成器输出的测试套件也适合进行此分析。其假设是不同的熵方法之间存在根本差异,并且最好的方法可能用于更好地检测勒索软件加密文件。本文比较了53种不同测试在区分加密数据和其他文件类型方面的准确性。测试分为两个阶段,第一阶段用于识别潜在的候选测试,第二阶段对这些候选测试进行全面评估。为确保测试足够稳健,使用了NapierOne数据集。该数据集包含数千个最常用文件类型的示例以及被加密勒索软件加密的文件示例。在测试的第二阶段,针对超过270,000个单独文件测试了11种候选熵计算技术,产生了近三百万次单独计算。然后评估每个单独测试区分使用加密勒索软件加密的文件和其他文件类型的能力的总体准确性,并使用此指标比较每个测试,以试图确定最适合加密文件识别的熵方法。还进行了一项调查,以确定是否采用混合方法,即将多个测试的结果结合起来,看是否能提高准确性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/023c49ede5fe/entropy-24-01503-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/98da31ddfc85/entropy-24-01503-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/4d6aaddd4d0b/entropy-24-01503-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/026094d09286/entropy-24-01503-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/acc075f92791/entropy-24-01503-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/023c49ede5fe/entropy-24-01503-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/98da31ddfc85/entropy-24-01503-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/4d6aaddd4d0b/entropy-24-01503-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/026094d09286/entropy-24-01503-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/acc075f92791/entropy-24-01503-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f205/9601406/023c49ede5fe/entropy-24-01503-g005.jpg

相似文献

1
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.用于勒索软件加密文件识别的熵计算方法比较
Entropy (Basel). 2022 Oct 21;24(10):1503. doi: 10.3390/e24101503.
2
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.一种使用编码算法中和基于熵测量的勒索软件检测技术的方法。
Entropy (Basel). 2022 Feb 4;24(2):239. doi: 10.3390/e24020239.
3
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.使用格式保留加密的勒索软件检测技术的中和方法。
Sensors (Basel). 2023 May 13;23(10):4728. doi: 10.3390/s23104728.
4
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.利用文件熵估计进行云服务中的有效勒索软件检测。
Sensors (Basel). 2023 Mar 10;23(6):3023. doi: 10.3390/s23063023.
5
Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.时间数据相关性提供增强的动态加密勒索软件预加密边界划定。
Sensors (Basel). 2023 Apr 28;23(9):4355. doi: 10.3390/s23094355.
6
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.一种用于在安卓物联网设备的高效视频编码(HEVC)流中隐藏勒索软件的加密隐写术方法。
Sensors (Basel). 2022 Mar 16;22(6):2281. doi: 10.3390/s22062281.
7
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.勒索软件中的熵共享:绕过基于熵的加密操作检测
Sensors (Basel). 2024 Feb 23;24(5):1446. doi: 10.3390/s24051446.
8
Ransomware: Analysing the Impact on Windows Active Directory Domain Services.勒索软件:分析对 Windows 活动目录域服务的影响。
Sensors (Basel). 2022 Jan 26;22(3):953. doi: 10.3390/s22030953.
9
Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.在流行地区,服用抗叶酸抗疟药物的人群中,叶酸补充剂与疟疾易感性和严重程度的关系。
Cochrane Database Syst Rev. 2022 Feb 1;2(2022):CD014217. doi: 10.1002/14651858.CD014217.
10
MIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance.MIFS:一种归一化双曲勒索软件威慑模型,具有更高的准确性和整体性能。
Sensors (Basel). 2024 Mar 7;24(6):1728. doi: 10.3390/s24061728.

引用本文的文献

1
A chaotic digital signature algorithm based on a dynamic substitution box.一种基于动态替换盒的混沌数字签名算法。
Sci Rep. 2025 Jan 19;15(1):2435. doi: 10.1038/s41598-024-83943-x.
2
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.勒索软件中的熵共享:绕过基于熵的加密操作检测
Sensors (Basel). 2024 Feb 23;24(5):1446. doi: 10.3390/s24051446.
3
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.使用格式保留加密的勒索软件检测技术的中和方法。

本文引用的文献

1
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.一种使用编码算法中和基于熵测量的勒索软件检测技术的方法。
Entropy (Basel). 2022 Feb 4;24(2):239. doi: 10.3390/e24020239.
Sensors (Basel). 2023 May 13;23(10):4728. doi: 10.3390/s23104728.