Analysis of Crypto-Ransomware Using Network Traffic

Ransomware is a form of malware attack that makes use of encryption to make information inaccessible for the motive of gathering a specified amount of payment. Many victims of this attack who couldn’t recover their information from backups have been compelled to decide between losing the information...

Full description

Bibliographic Details
Main Authors: Otasowie Owolafe, Aderonke F. Thompson
Format: Article
Language:English
Published: Naif University Publishing House 2022-06-01
Series:Journal of Information Security and Cybercrimes Research
Subjects:
Online Access:https://journals.nauss.edu.sa/index.php/JISCR/article/view/1805
_version_ 1827320110259372032
author Otasowie Owolafe
Aderonke F. Thompson
author_facet Otasowie Owolafe
Aderonke F. Thompson
author_sort Otasowie Owolafe
collection DOAJ
description Ransomware is a form of malware attack that makes use of encryption to make information inaccessible for the motive of gathering a specified amount of payment. Many victims of this attack who couldn’t recover their information from backups have been compelled to decide between losing the information or paying the sum requested by the attacker. This research shows some of the various samples of ransomware, the phases of attack, and the chance of recognizing ransomware by the network traffic patterns it generates. Traffic generated from the infected system was considered. Experimental results from the ransomware detection show that some certain ransomware is very noisy and generates noticeable traffic patterns. In light of traffic information gathered from ransomware, conceivable discovery thoughts could be investigated. The result of the analysis shows that some ransomware generates traffic that is different from normal network traffic. Also, the infection of the file server system shows that the length and time vary but after infection the time for the different samples of ransomware to carry out its encryption is constant.
first_indexed 2024-04-25T00:40:52Z
format Article
id doaj.art-7f9491b52a9e44f9a5b37bd1bcf90ca5
institution Directory Open Access Journal
issn 1658-7782
1658-7790
language English
last_indexed 2024-04-25T00:40:52Z
publishDate 2022-06-01
publisher Naif University Publishing House
record_format Article
series Journal of Information Security and Cybercrimes Research
spelling doaj.art-7f9491b52a9e44f9a5b37bd1bcf90ca52024-03-12T11:14:07ZengNaif University Publishing HouseJournal of Information Security and Cybercrimes Research1658-77821658-77902022-06-0151768310.26735/JVUJ34981509Analysis of Crypto-Ransomware Using Network TrafficOtasowie Owolafe0Aderonke F. Thompson1The Federal University of Technology Akure, Akure, Nigeria.The Federal University of Technology Akure, Akure, Nigeria.Ransomware is a form of malware attack that makes use of encryption to make information inaccessible for the motive of gathering a specified amount of payment. Many victims of this attack who couldn’t recover their information from backups have been compelled to decide between losing the information or paying the sum requested by the attacker. This research shows some of the various samples of ransomware, the phases of attack, and the chance of recognizing ransomware by the network traffic patterns it generates. Traffic generated from the infected system was considered. Experimental results from the ransomware detection show that some certain ransomware is very noisy and generates noticeable traffic patterns. In light of traffic information gathered from ransomware, conceivable discovery thoughts could be investigated. The result of the analysis shows that some ransomware generates traffic that is different from normal network traffic. Also, the infection of the file server system shows that the length and time vary but after infection the time for the different samples of ransomware to carry out its encryption is constant.https://journals.nauss.edu.sa/index.php/JISCR/article/view/1805cybersecuritycrypto-mixcrypto-ransomwarecrypto-shieldmessage block (smb2)network trafficransomware
spellingShingle Otasowie Owolafe
Aderonke F. Thompson
Analysis of Crypto-Ransomware Using Network Traffic
Journal of Information Security and Cybercrimes Research
cybersecurity
crypto-mix
crypto-ransomware
crypto-shield
message block (smb2)
network traffic
ransomware
title Analysis of Crypto-Ransomware Using Network Traffic
title_full Analysis of Crypto-Ransomware Using Network Traffic
title_fullStr Analysis of Crypto-Ransomware Using Network Traffic
title_full_unstemmed Analysis of Crypto-Ransomware Using Network Traffic
title_short Analysis of Crypto-Ransomware Using Network Traffic
title_sort analysis of crypto ransomware using network traffic
topic cybersecurity
crypto-mix
crypto-ransomware
crypto-shield
message block (smb2)
network traffic
ransomware
url https://journals.nauss.edu.sa/index.php/JISCR/article/view/1805
work_keys_str_mv AT otasowieowolafe analysisofcryptoransomwareusingnetworktraffic
AT aderonkefthompson analysisofcryptoransomwareusingnetworktraffic