Ransomware deployment methods and analysis: views from a predictive model and human responses
Abstract Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern of ransomware attack vectors. Therefo...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
BMC
2019-02-01
|
Series: | Crime Science |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s40163-019-0097-9 |
id |
doaj-8566f618d7274ebaa8aefb647fce2f36 |
---|---|
record_format |
Article |
spelling |
doaj-8566f618d7274ebaa8aefb647fce2f362020-11-25T02:50:09ZengBMCCrime Science2193-76802019-02-018112210.1186/s40163-019-0097-9Ransomware deployment methods and analysis: views from a predictive model and human responsesGavin Hull0Henna John1Budi Arief2DeloitteAccenture Cyber Fusion CenterUniversity of KentAbstract Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern of ransomware attack vectors. Therefore, in order to combat ransomware, we need a better understanding on how ransomware is being deployed, its characteristics, as well as how potential victims may react to ransomware incidents. This paper aims to address this challenge by carrying out an investigation on 18 families of ransomware, leading to a model for categorising ransomware behavioural characteristics, which can then be used to improve detection and handling of ransomware incidents. The categorisation was done in respect to the stages of ransomware deployment methods with a predictive model we developed called Randep. The stages are fingerprint, propagate, communicate, map, encrypt, lock, delete and threaten. Analysing the samples gathered for the predictive model provided an insight into the stages and timeline of ransomware execution. Furthermore, we carried out a study on how potential victims (individuals, as well as IT support staff at universities and SMEs) detect that ransomware was being deployed on their machine, what steps they took to investigate the incident, and how they responded to the attack. Both quantitative and qualitative data were collected through questionnaires and in-depth interviews. The results shed an interesting light into the most common attack methods, the most targeted operating systems and the infection symptoms, as well as recommended defence mechanisms. This information can be used in the future to create behavioural patterns for improved ransomware detection and response.http://link.springer.com/article/10.1186/s40163-019-0097-9RansomwareCybercrimePredictive modelClassificationVictim study |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Gavin Hull Henna John Budi Arief |
spellingShingle |
Gavin Hull Henna John Budi Arief Ransomware deployment methods and analysis: views from a predictive model and human responses Crime Science Ransomware Cybercrime Predictive model Classification Victim study |
author_facet |
Gavin Hull Henna John Budi Arief |
author_sort |
Gavin Hull |
title |
Ransomware deployment methods and analysis: views from a predictive model and human responses |
title_short |
Ransomware deployment methods and analysis: views from a predictive model and human responses |
title_full |
Ransomware deployment methods and analysis: views from a predictive model and human responses |
title_fullStr |
Ransomware deployment methods and analysis: views from a predictive model and human responses |
title_full_unstemmed |
Ransomware deployment methods and analysis: views from a predictive model and human responses |
title_sort |
ransomware deployment methods and analysis: views from a predictive model and human responses |
publisher |
BMC |
series |
Crime Science |
issn |
2193-7680 |
publishDate |
2019-02-01 |
description |
Abstract Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern of ransomware attack vectors. Therefore, in order to combat ransomware, we need a better understanding on how ransomware is being deployed, its characteristics, as well as how potential victims may react to ransomware incidents. This paper aims to address this challenge by carrying out an investigation on 18 families of ransomware, leading to a model for categorising ransomware behavioural characteristics, which can then be used to improve detection and handling of ransomware incidents. The categorisation was done in respect to the stages of ransomware deployment methods with a predictive model we developed called Randep. The stages are fingerprint, propagate, communicate, map, encrypt, lock, delete and threaten. Analysing the samples gathered for the predictive model provided an insight into the stages and timeline of ransomware execution. Furthermore, we carried out a study on how potential victims (individuals, as well as IT support staff at universities and SMEs) detect that ransomware was being deployed on their machine, what steps they took to investigate the incident, and how they responded to the attack. Both quantitative and qualitative data were collected through questionnaires and in-depth interviews. The results shed an interesting light into the most common attack methods, the most targeted operating systems and the infection symptoms, as well as recommended defence mechanisms. This information can be used in the future to create behavioural patterns for improved ransomware detection and response. |
topic |
Ransomware Cybercrime Predictive model Classification Victim study |
url |
http://link.springer.com/article/10.1186/s40163-019-0097-9 |
work_keys_str_mv |
AT gavinhull ransomwaredeploymentmethodsandanalysisviewsfromapredictivemodelandhumanresponses AT hennajohn ransomwaredeploymentmethodsandanalysisviewsfromapredictivemodelandhumanresponses AT budiarief ransomwaredeploymentmethodsandanalysisviewsfromapredictivemodelandhumanresponses |
_version_ |
1724739740728557568 |