Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes data unrecoverable once the victim’s files hav...

Full description

Bibliographic Details
Main Authors: S. H. Kok, Azween Abdullah, NZ Jhanjhi, Mahadevan Supramaniam
Format: Article
Language:English
Published: MDPI AG 2019-11-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/8/4/79
_version_ 1811307708783001600
author S. H. Kok
Azween Abdullah
NZ Jhanjhi
Mahadevan Supramaniam
author_facet S. H. Kok
Azween Abdullah
NZ Jhanjhi
Mahadevan Supramaniam
author_sort S. H. Kok
collection DOAJ
description Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes data unrecoverable once the victim’s files have been encrypted. Therefore, in this research, it was proposed that machine learning is used to detect crypto-ransomware before it starts its encryption function, or at the pre-encryption stage. Successful detection at this stage is crucial to enable the attack to be stopped from achieving its objective. Once the victim was aware of the presence of crypto-ransomware, valuable data and files can be backed up to another location, and then an attempt can be made to clean the ransomware with minimum risk. Therefore we proposed a pre-encryption detection algorithm (PEDA) that consisted of two phases. In, PEDA-Phase-I, a Windows application programming interface (API) generated by a suspicious program would be captured and analyzed using the learning algorithm (LA). The LA can determine whether the suspicious program was a crypto-ransomware or not, through API pattern recognition. This approach was used to ensure the most comprehensive detection of both known and unknown crypto-ransomware, but it may have a high false positive rate (FPR). If the prediction was a crypto-ransomware, PEDA would generate a signature of the suspicious program, and store it in the signature repository, which was in Phase-II. In PEDA-Phase-II, the signature repository allows the detection of crypto-ransomware at a much earlier stage, which was at the pre-execution stage through the signature matching method. This method can only detect known crypto-ransomware, and although very rigid, it was accurate and fast. The two phases in PEDA formed two layers of early detection for crypto-ransomware to ensure zero files lost to the user. However in this research, we focused upon Phase-I, which was the LA. Based on our results, the LA had the lowest FPR of 1.56% compared to Naive Bayes (NB), Random Forest (RF), Ensemble (NB and RF) and EldeRan (a machine learning approach to analyze and classify ransomware). Low FPR indicates that LA has a low probability of predicting goodware wrongly.
first_indexed 2024-04-13T09:09:07Z
format Article
id doaj.art-7b98d9d7387e499f8bd6718b4361c316
institution Directory Open Access Journal
issn 2073-431X
language English
last_indexed 2024-04-13T09:09:07Z
publishDate 2019-11-01
publisher MDPI AG
record_format Article
series Computers
spelling doaj.art-7b98d9d7387e499f8bd6718b4361c3162022-12-22T02:52:55ZengMDPI AGComputers2073-431X2019-11-01847910.3390/computers8040079computers8040079Prevention of Crypto-Ransomware Using a Pre-Encryption Detection AlgorithmS. H. Kok0Azween Abdullah1NZ Jhanjhi2Mahadevan Supramaniam3School of Computer and IT (SoCIT), Taylor’s University, Subang Jaya 47500, Selangor, MalaysiaSchool of Computer and IT (SoCIT), Taylor’s University, Subang Jaya 47500, Selangor, MalaysiaSchool of Computer and IT (SoCIT), Taylor’s University, Subang Jaya 47500, Selangor, MalaysiaResearch and Innovation Management Center, SEGi University, Petaling Jaya 47810, Selangor, MalaysiaRansomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes data unrecoverable once the victim’s files have been encrypted. Therefore, in this research, it was proposed that machine learning is used to detect crypto-ransomware before it starts its encryption function, or at the pre-encryption stage. Successful detection at this stage is crucial to enable the attack to be stopped from achieving its objective. Once the victim was aware of the presence of crypto-ransomware, valuable data and files can be backed up to another location, and then an attempt can be made to clean the ransomware with minimum risk. Therefore we proposed a pre-encryption detection algorithm (PEDA) that consisted of two phases. In, PEDA-Phase-I, a Windows application programming interface (API) generated by a suspicious program would be captured and analyzed using the learning algorithm (LA). The LA can determine whether the suspicious program was a crypto-ransomware or not, through API pattern recognition. This approach was used to ensure the most comprehensive detection of both known and unknown crypto-ransomware, but it may have a high false positive rate (FPR). If the prediction was a crypto-ransomware, PEDA would generate a signature of the suspicious program, and store it in the signature repository, which was in Phase-II. In PEDA-Phase-II, the signature repository allows the detection of crypto-ransomware at a much earlier stage, which was at the pre-execution stage through the signature matching method. This method can only detect known crypto-ransomware, and although very rigid, it was accurate and fast. The two phases in PEDA formed two layers of early detection for crypto-ransomware to ensure zero files lost to the user. However in this research, we focused upon Phase-I, which was the LA. Based on our results, the LA had the lowest FPR of 1.56% compared to Naive Bayes (NB), Random Forest (RF), Ensemble (NB and RF) and EldeRan (a machine learning approach to analyze and classify ransomware). Low FPR indicates that LA has a low probability of predicting goodware wrongly.https://www.mdpi.com/2073-431X/8/4/79cryptoencryptionmachine learningransomwareintrusion detection
spellingShingle S. H. Kok
Azween Abdullah
NZ Jhanjhi
Mahadevan Supramaniam
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
Computers
crypto
encryption
machine learning
ransomware
intrusion detection
title Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
title_full Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
title_fullStr Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
title_full_unstemmed Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
title_short Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
title_sort prevention of crypto ransomware using a pre encryption detection algorithm
topic crypto
encryption
machine learning
ransomware
intrusion detection
url https://www.mdpi.com/2073-431X/8/4/79
work_keys_str_mv AT shkok preventionofcryptoransomwareusingapreencryptiondetectionalgorithm
AT azweenabdullah preventionofcryptoransomwareusingapreencryptiondetectionalgorithm
AT nzjhanjhi preventionofcryptoransomwareusingapreencryptiondetectionalgorithm
AT mahadevansupramaniam preventionofcryptoransomwareusingapreencryptiondetectionalgorithm