Artigo Acesso aberto Revisado por pares

Automatically Traceback RDP‐Based Targeted Ransomware Attacks

2018; Wiley; Volume: 2018; Issue: 1 Linguagem: Inglês

10.1155/2018/7943586

ISSN

1530-8677

Autores

ZiHan Wang, Chaoge Liu, Jing Qiu, Zhihong Tian, Xiang Cui, Shen Su,

Tópico(s)

Information and Cyber Security

Resumo

While various ransomware defense systems have been proposed to deal with traditional randomly‐spread ransomware attacks (based on their unique high‐noisy behaviors at hosts and on networks), none of them considered ransomware attacks precisely aiming at specific hosts, e.g., using the common Remote Desktop Protocol (RDP). To address this problem, we propose a systematic method to fight such specifically targeted ransomware by trapping attackers via a network deception environment and then using traceback techniques to identify attack sources. In particular, we developed various monitors in the proposed deception environment to gather traceable clues about attackers, and we further design an analysis system that automatically extracts and analyze the collected clues. Our evaluations show that the proposed method can trap the adversary in the deception environment and significantly improve the efficiency of clue analysis. Furthermore, it also helps us trace back RDP‐based ransomware attackers and ransomware makers in the practical applications.

Referência(s)