Ransomware deployment methods and analysis: views from a predictive model and human responses

Abstract Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern of ransomware attack vectors. Therefo...

Full description

Bibliographic Details
Main Authors: Gavin Hull, Henna John, Budi Arief
Format: Article
Language:English
Published: BMC 2019-02-01
Series:Crime Science
Subjects:
Online Access:http://link.springer.com/article/10.1186/s40163-019-0097-9
id doaj-8566f618d7274ebaa8aefb647fce2f36
record_format Article
spelling doaj-8566f618d7274ebaa8aefb647fce2f362020-11-25T02:50:09ZengBMCCrime Science2193-76802019-02-018112210.1186/s40163-019-0097-9Ransomware deployment methods and analysis: views from a predictive model and human responsesGavin Hull0Henna John1Budi Arief2DeloitteAccenture Cyber Fusion CenterUniversity of KentAbstract Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern of ransomware attack vectors. Therefore, in order to combat ransomware, we need a better understanding on how ransomware is being deployed, its characteristics, as well as how potential victims may react to ransomware incidents. This paper aims to address this challenge by carrying out an investigation on 18 families of ransomware, leading to a model for categorising ransomware behavioural characteristics, which can then be used to improve detection and handling of ransomware incidents. The categorisation was done in respect to the stages of ransomware deployment methods with a predictive model we developed called Randep. The stages are fingerprint, propagate, communicate, map, encrypt, lock, delete and threaten. Analysing the samples gathered for the predictive model provided an insight into the stages and timeline of ransomware execution. Furthermore, we carried out a study on how potential victims (individuals, as well as IT support staff at universities and SMEs) detect that ransomware was being deployed on their machine, what steps they took to investigate the incident, and how they responded to the attack. Both quantitative and qualitative data were collected through questionnaires and in-depth interviews. The results shed an interesting light into the most common attack methods, the most targeted operating systems and the infection symptoms, as well as recommended defence mechanisms. This information can be used in the future to create behavioural patterns for improved ransomware detection and response.http://link.springer.com/article/10.1186/s40163-019-0097-9RansomwareCybercrimePredictive modelClassificationVictim study
collection DOAJ
language English
format Article
sources DOAJ
author Gavin Hull
Henna John
Budi Arief
spellingShingle Gavin Hull
Henna John
Budi Arief
Ransomware deployment methods and analysis: views from a predictive model and human responses
Crime Science
Ransomware
Cybercrime
Predictive model
Classification
Victim study
author_facet Gavin Hull
Henna John
Budi Arief
author_sort Gavin Hull
title Ransomware deployment methods and analysis: views from a predictive model and human responses
title_short Ransomware deployment methods and analysis: views from a predictive model and human responses
title_full Ransomware deployment methods and analysis: views from a predictive model and human responses
title_fullStr Ransomware deployment methods and analysis: views from a predictive model and human responses
title_full_unstemmed Ransomware deployment methods and analysis: views from a predictive model and human responses
title_sort ransomware deployment methods and analysis: views from a predictive model and human responses
publisher BMC
series Crime Science
issn 2193-7680
publishDate 2019-02-01
description Abstract Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern of ransomware attack vectors. Therefore, in order to combat ransomware, we need a better understanding on how ransomware is being deployed, its characteristics, as well as how potential victims may react to ransomware incidents. This paper aims to address this challenge by carrying out an investigation on 18 families of ransomware, leading to a model for categorising ransomware behavioural characteristics, which can then be used to improve detection and handling of ransomware incidents. The categorisation was done in respect to the stages of ransomware deployment methods with a predictive model we developed called Randep. The stages are fingerprint, propagate, communicate, map, encrypt, lock, delete and threaten. Analysing the samples gathered for the predictive model provided an insight into the stages and timeline of ransomware execution. Furthermore, we carried out a study on how potential victims (individuals, as well as IT support staff at universities and SMEs) detect that ransomware was being deployed on their machine, what steps they took to investigate the incident, and how they responded to the attack. Both quantitative and qualitative data were collected through questionnaires and in-depth interviews. The results shed an interesting light into the most common attack methods, the most targeted operating systems and the infection symptoms, as well as recommended defence mechanisms. This information can be used in the future to create behavioural patterns for improved ransomware detection and response.
topic Ransomware
Cybercrime
Predictive model
Classification
Victim study
url http://link.springer.com/article/10.1186/s40163-019-0097-9
work_keys_str_mv AT gavinhull ransomwaredeploymentmethodsandanalysisviewsfromapredictivemodelandhumanresponses
AT hennajohn ransomwaredeploymentmethodsandanalysisviewsfromapredictivemodelandhumanresponses
AT budiarief ransomwaredeploymentmethodsandanalysisviewsfromapredictivemodelandhumanresponses
_version_ 1724739740728557568