论文标题
使用过程内存勒索软件检测
Ransomware Detection using Process Memory
论文作者
论文摘要
近年来,勒索软件攻击已大大增加,造成了巨大的破坏和关键系统和业务运营的损失。攻击者始终发现绕过检测机制的创新方法,这是通过人工智能的采用。但是,大多数研究总结了AI的一般特征,并引起了许多误报,因为勒索软件的行为不断绕开检测。专注于指示勒索软件的主要功能变得至关重要,因为这将调查员指导勒索软件本身的内部运作和主要功能。通过在过程内存中利用访问特权,可以更轻松,准确地检测勒索软件的主要功能。此外,可以确定勒索软件系列的新签名和指纹,以正确对新颖的勒索软件攻击进行分类。当前的研究使用了可执行器行为的不同记忆区域的过程内存访问特权,以在发生严重伤害之前快速确定其意图。为了实现这一目标,探索了几种著名的机器学习算法,精度范围为81.38至96.28。因此,该研究证实了利用过程记忆作为勒索软件的检测机制的可行性。
Ransomware attacks have increased significantly in recent years, causing great destruction and damage to critical systems and business operations. Attackers are unfailingly finding innovative ways to bypass detection mechanisms, whichencouraged the adoption of artificial intelligence. However, most research summarizes the general features of AI and induces many false positives, as the behavior of ransomware constantly differs to bypass detection. Focusing on the key indicating features of ransomware becomes vital as this guides the investigator to the inner workings and main function of ransomware itself. By utilizing access privileges in process memory, the main function of the ransomware can be detected more easily and accurately. Furthermore, new signatures and fingerprints of ransomware families can be identified to classify novel ransomware attacks correctly. The current research used the process memory access privileges of the different memory regions of the behavior of an executable to quickly determine its intent before serious harm can occur. To achieve this aim, several well-known machine learning algorithms were explored with an accuracy range of 81.38 to 96.28 percents. The study thus confirms the feasibility of utilizing process memory as a detection mechanism for ransomware.