Open Repository for the Evaluation of Ransomware Detection Tools

Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied before the ransomware encrypts files or durin...

Full description

Bibliographic Details
Main Authors: Eduardo Berrueta, Daniel Morato, Eduardo Magana, Mikel Izal
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9050526/
id doaj-505dba8e519f4f9b9c1d52db44e7a347
record_format Article
spelling doaj-505dba8e519f4f9b9c1d52db44e7a3472021-03-30T01:36:16ZengIEEEIEEE Access2169-35362020-01-018656586566910.1109/ACCESS.2020.29841879050526Open Repository for the Evaluation of Ransomware Detection ToolsEduardo Berrueta0https://orcid.org/0000-0002-0076-4479Daniel Morato1https://orcid.org/0000-0002-0831-4042Eduardo Magana2Mikel Izal3https://orcid.org/0000-0002-2770-912XDepartment of Electrical, Electronic and Communications Engineering, Public University of Navarre at Arrosadia Campus, Pamplona, SpainInstitute of Smart Cities, Pamplona, SpainDepartment of Electrical, Electronic and Communications Engineering, Public University of Navarre at Arrosadia Campus, Pamplona, SpainDepartment of Electrical, Electronic and Communications Engineering, Public University of Navarre at Arrosadia Campus, Pamplona, SpainCrypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied before the ransomware encrypts files or during its action in an infected host. The evaluation of these proposals has always been accomplished using sets of ransomware samples that are prepared locally for the research article, without making the data available. Different studies use different sets of samples and different evaluation metrics, resulting in insufficient comparability. In this paper, we describe a public data repository containing the file access operations of more than 70 ransomware samples during the encryption of a large network shared directory. These data have already been used successfully in the evaluation of a network-based ransomware detection algorithm. Now, we are making these data available to the community and describing their details, how they were captured, and how they can be used in the evaluation and comparison of the results of most ransomware detection techniques.https://ieeexplore.ieee.org/document/9050526/Ransomwareopen repositorytraffic analysis
collection DOAJ
language English
format Article
sources DOAJ
author Eduardo Berrueta
Daniel Morato
Eduardo Magana
Mikel Izal
spellingShingle Eduardo Berrueta
Daniel Morato
Eduardo Magana
Mikel Izal
Open Repository for the Evaluation of Ransomware Detection Tools
IEEE Access
Ransomware
open repository
traffic analysis
author_facet Eduardo Berrueta
Daniel Morato
Eduardo Magana
Mikel Izal
author_sort Eduardo Berrueta
title Open Repository for the Evaluation of Ransomware Detection Tools
title_short Open Repository for the Evaluation of Ransomware Detection Tools
title_full Open Repository for the Evaluation of Ransomware Detection Tools
title_fullStr Open Repository for the Evaluation of Ransomware Detection Tools
title_full_unstemmed Open Repository for the Evaluation of Ransomware Detection Tools
title_sort open repository for the evaluation of ransomware detection tools
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of malware; these techniques are applied before the ransomware encrypts files or during its action in an infected host. The evaluation of these proposals has always been accomplished using sets of ransomware samples that are prepared locally for the research article, without making the data available. Different studies use different sets of samples and different evaluation metrics, resulting in insufficient comparability. In this paper, we describe a public data repository containing the file access operations of more than 70 ransomware samples during the encryption of a large network shared directory. These data have already been used successfully in the evaluation of a network-based ransomware detection algorithm. Now, we are making these data available to the community and describing their details, how they were captured, and how they can be used in the evaluation and comparison of the results of most ransomware detection techniques.
topic Ransomware
open repository
traffic analysis
url https://ieeexplore.ieee.org/document/9050526/
work_keys_str_mv AT eduardoberrueta openrepositoryfortheevaluationofransomwaredetectiontools
AT danielmorato openrepositoryfortheevaluationofransomwaredetectiontools
AT eduardomagana openrepositoryfortheevaluationofransomwaredetectiontools
AT mikelizal openrepositoryfortheevaluationofransomwaredetectiontools
_version_ 1724186777777864704