• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用格式保留加密的勒索软件检测技术的中和方法。

Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.

机构信息

Interdisciplinary Program of Information & Protection, Mokpo National University, Muan 58554, Republic of Korea.

Department of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea.

出版信息

Sensors (Basel). 2023 May 13;23(10):4728. doi: 10.3390/s23104728.

DOI:10.3390/s23104728
PMID:37430642
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10221448/
Abstract

Ransomware is one type of malware that involves restricting access to files by encrypting files stored on the victim's system and demanding money in return for file recovery. Although various ransomware detection technologies have been introduced, existing ransomware detection technologies have certain limitations and problems that affect their detection ability. Therefore, there is a need for new detection technologies that can overcome the problems of existing detection methods and minimize the damage from ransomware. A technology that can be used to detect files infected by ransomware and by measuring the entropy of files has been proposed. However, from an attacker's point of view, neutralization technology can bypass detection through neutralization using entropy. A representative neutralization method is one that involves decreasing the entropy of encrypted files by using an encoding technology such as base64. This technology also makes it possible to detect files that are infected by ransomware by measuring entropy after decoding the encoded files, which, in turn, means the failure of the ransomware detection-neutralization technology. Therefore, this paper derives three requirements for a more sophisticated ransomware detection-neutralization method from the perspective of an attacker for it to have novelty. These requirements are (1) it must not be decoded; (2) it must support encryption using secret information; and (3) the entropy of the generated ciphertext must be similar to that of plaintext. The proposed neutralization method satisfies these requirements, supports encryption without decoding, and applies format-preserving encryption that can adjust the input and output lengths. To overcome the limitations of neutralization technology using the encoding algorithm, we utilized format-preserving encryption, which could allow the attacker to manipulate the entropy of the ciphertext as desired by changing the expression range of numbers and controlling the input and output lengths in a very free manner. To apply format-preserving encryption, Byte Split, BinaryToASCII, and Radix Conversion methods were evaluated, and an optimal neutralization method was derived based on the experimental results of these three methods. As a result of the comparative analysis of the neutralization performance with existing studies, when the entropy threshold value was 0.5 in the Radix Conversion method, which was the optimal neutralization method derived from the proposed study, the neutralization accuracy was improved by 96% based on the PPTX file format. The results of this study provide clues for future studies to derive a plan to counter the technology that can neutralize ransomware detection technology.

摘要

勒索软件是一种恶意软件,它通过加密存储在受害者系统上的文件来限制对文件的访问,并要求支付赎金以恢复文件。尽管已经引入了各种勒索软件检测技术,但现有的勒索软件检测技术存在一定的局限性和问题,影响了它们的检测能力。因此,需要新的检测技术来克服现有检测方法的问题,并将勒索软件造成的损害降到最低。已经提出了一种可以检测感染勒索软件的文件并通过测量文件的熵来检测文件的技术。然而,从攻击者的角度来看,通过使用熵进行中和,可以绕过检测。一种代表性的中和方法是使用 base64 等编码技术降低加密文件的熵。这种技术还可以通过测量编码文件的熵来检测感染勒索软件的文件,这反过来又意味着勒索软件检测中和技术的失败。因此,本文从攻击者的角度出发,为更复杂的勒索软件检测中和方法推导出三个新颖性要求。这些要求是 (1) 它不能被解码;(2) 它必须支持使用秘密信息进行加密;(3) 生成的密文的熵必须与明文的熵相似。所提出的中和方法满足这些要求,支持无需解码的加密,并应用可以调整输入和输出长度的格式保持加密。为了克服使用编码算法进行中和技术的局限性,我们利用了格式保持加密,攻击者可以通过改变数字的表示范围并以非常自由的方式控制输入和输出长度来操纵密文的熵。为了应用格式保持加密,评估了 Byte Split、BinaryToASCII 和 Radix Conversion 方法,并根据这三种方法的实验结果推导出了一种最佳中和方法。通过与现有研究的中和性能的比较分析,当 Radix Conversion 方法中的熵阈值为 0.5 时(这是从提出的研究中推导出的最佳中和方法),基于 PPTX 文件格式,中和精度提高了 96%。本研究的结果为未来的研究提供了线索,以制定对抗可以中和勒索软件检测技术的技术的计划。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/5873b220bf89/sensors-23-04728-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/c06b5e8dd312/sensors-23-04728-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/1477357f81ef/sensors-23-04728-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/c683859ddc1b/sensors-23-04728-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/1ca581c6a1ab/sensors-23-04728-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/2403877d66a2/sensors-23-04728-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/4272f0d893f0/sensors-23-04728-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/274dfbe2cb9c/sensors-23-04728-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/8142dae91fcc/sensors-23-04728-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/5873b220bf89/sensors-23-04728-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/c06b5e8dd312/sensors-23-04728-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/1477357f81ef/sensors-23-04728-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/c683859ddc1b/sensors-23-04728-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/1ca581c6a1ab/sensors-23-04728-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/2403877d66a2/sensors-23-04728-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/4272f0d893f0/sensors-23-04728-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/274dfbe2cb9c/sensors-23-04728-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/8142dae91fcc/sensors-23-04728-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02d1/10221448/5873b220bf89/sensors-23-04728-g009.jpg

相似文献

1
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.使用格式保留加密的勒索软件检测技术的中和方法。
Sensors (Basel). 2023 May 13;23(10):4728. doi: 10.3390/s23104728.
2
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.一种使用编码算法中和基于熵测量的勒索软件检测技术的方法。
Entropy (Basel). 2022 Feb 4;24(2):239. doi: 10.3390/e24020239.
3
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.用于勒索软件加密文件识别的熵计算方法比较
Entropy (Basel). 2022 Oct 21;24(10):1503. doi: 10.3390/e24101503.
4
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.利用文件熵估计进行云服务中的有效勒索软件检测。
Sensors (Basel). 2023 Mar 10;23(6):3023. doi: 10.3390/s23063023.
5
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.勒索软件中的熵共享:绕过基于熵的加密操作检测
Sensors (Basel). 2024 Feb 23;24(5):1446. doi: 10.3390/s24051446.
6
Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.时间数据相关性提供增强的动态加密勒索软件预加密边界划定。
Sensors (Basel). 2023 Apr 28;23(9):4355. doi: 10.3390/s23094355.
7
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.E2E-RDS:基于静态 ML 和基于视觉的 DL 方法的高效端到端勒索软件检测系统。
Sensors (Basel). 2023 May 4;23(9):4467. doi: 10.3390/s23094467.
8
Prediction of android ransomware with deep learning model using hybrid cryptography.使用混合加密技术的深度学习模型预测安卓勒索软件
Sci Rep. 2024 Sep 27;14(1):22351. doi: 10.1038/s41598-024-70544-x.
9
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.多接入边缘计算中面向车联网的新型消息保持方案与格式保持加密
Sensors (Basel). 2019 Sep 7;19(18):3869. doi: 10.3390/s19183869.
10
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.一种用于在安卓物联网设备的高效视频编码(HEVC)流中隐藏勒索软件的加密隐写术方法。
Sensors (Basel). 2022 Mar 16;22(6):2281. doi: 10.3390/s22062281.

引用本文的文献

1
A Machine Learning-Based Ransomware Detection Method for Attackers' Neutralization Techniques Using Format-Preserving Encryption.一种基于机器学习的勒索软件检测方法,用于应对使用格式保留加密的攻击者中和技术。
Sensors (Basel). 2025 Apr 10;25(8):2406. doi: 10.3390/s25082406.
2
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.勒索软件中的熵共享:绕过基于熵的加密操作检测
Sensors (Basel). 2024 Feb 23;24(5):1446. doi: 10.3390/s24051446.

本文引用的文献

1
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.用于勒索软件加密文件识别的熵计算方法比较
Entropy (Basel). 2022 Oct 21;24(10):1503. doi: 10.3390/e24101503.
2
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.一种使用编码算法中和基于熵测量的勒索软件检测技术的方法。
Entropy (Basel). 2022 Feb 4;24(2):239. doi: 10.3390/e24020239.
3
An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.一种基于连续变量量子神经网络的密码学方法。
Sci Rep. 2020 Feb 7;10(1):2107. doi: 10.1038/s41598-020-58928-1.