File:DETECTING RANSOMWARE THROUGH POWER ANALYSIS (IA detectingransomw1094559721).pdf
Original file (1,275 × 1,650 pixels, file size: 2.38 MB, MIME type: application/pdf, 104 pages)
Captions
Summary[edit]
DETECTING RANSOMWARE THROUGH POWER ANALYSIS ( ) | |
---|---|
Author |
Melton, Jacob D. |
Title |
DETECTING RANSOMWARE THROUGH POWER ANALYSIS |
Publisher |
Monterey, CA; Naval Postgraduate School |
Description |
Cyber criminals are increasingly using malicious programs to take control of and exploit individuals’, businesses’, and governments’ data. A large portion of malware is a type called ransomware, which finds a way to restrict the infected user’s access to data until a payment is obtained. Current detection solutions include programs that analyze file system changes and registry events, employ honeypot techniques, and identify anomalies in network patterns. This research presents an algorithm developed to detect ransomware by analyzing a computer’s power consumption. Specifically, the algorithm identifies features of the computer’s power consumption that are indicative of encryption operations. We can successfully identify encryption of files with sizes of 500MB and greater with a high degree of success. By applying our encryption detection algorithm to the Cryptographic Ransomware, we are able to successfully identify the execution of WannaCry Ransomware samples. Subjects: solid-state drive; power analysis; ransomware; encryption |
Language | English |
Publication date | June 2018 |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
Accession number |
detectingransomw1094559721 |
Source | |
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. |
Licensing[edit]
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 16:57, 16 July 2020 | 1,275 × 1,650, 104 pages (2.38 MB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection detectingransomw1094559721 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #13536) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | DETECTING RANSOMWARE THROUGH POWER ANALYSIS |
---|---|
Image title | |
Author | Melton, Jacob D. |
Software used | Melton, Jacob D. |
Conversion program | pdfTeX-1.40.18 |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |