redemption real time protection against ransomware at end
play

Redemption: Real-Time Protection Against Ransomware at End-Hosts - PowerPoint PPT Presentation

Redemption: Real-Time Protection Against Ransomware at End-Hosts WRITTEN BY: PRESENTED BY: AMIN KHARRAZ NICHOLAS BURTON ENGIN KIRDA What is Ransomware? What is Ransomware? u Ransomware is malicious software that encrypts user data, and


  1. Redemption: Real-Time Protection Against Ransomware at End-Hosts WRITTEN BY: PRESENTED BY: AMIN KHARRAZ NICHOLAS BURTON ENGIN KIRDA

  2. What is Ransomware?

  3. What is Ransomware? u Ransomware is malicious software that encrypts user data, and demands a ransom is paid to unlock it.

  4. Well that sucks, how do I get my data back?

  5. Data Retrieval u The easiest solution: keep a backup of your files.

  6. Data Retrieval u The easiest solution: keep a backup of your files. u If and when you system is compromised by ransomware, you can use the backup to get back your files.

  7. I don’t have a backup … .

  8. I don’t have a backup … . and I NEED those files!

  9. This is really bad, can I prevent this?

  10. Prevention u CryptoDrop

  11. Prevention u CryptoDrop u SheildFS

  12. Prevention u CryptoDrop u SheildFS u PayBreak

  13. None of those work very well, what now?

  14. Redemption, Real-Time Protection

  15. Redemption Design Overview Two Components of Redemption u A characterization of ransomware behavior based on a large class of current ransomware. u High performance and integrity mechanism to restore attacked files.

  16. Redemption Design Overview

  17. How to determine Malice Score?

  18. Malice Score Two Components of Malice Score Calculation u Content-based features u Behavior-based features

  19. Content-Based Features u Entropy Ratio of Data Blocks (Shannon Entropy)

  20. Content-Based Features u Entropy Ratio of Data Blocks (Shannon Entropy) u File Content Overwrite

  21. Content-Based Features u Entropy Ratio of Data Blocks (Shannon Entropy) u File Content Overwrite u Delete Operations

  22. Behavior-based Features u Directory Traversal

  23. Behavior-based Features u Directory Traversal u Converting Files to a Specific Type

  24. Behavior-based Features u Directory Traversal u Converting Files to a Specific Type u Access Frequency

  25. Why two components of malice score calculation?

  26. Why two components of malice score calculation?

  27. Acceptable Malice Score

  28. Testing Against Other Anti-Ransomware Applications

  29. Overhead

  30. Getting around Redemption

  31. Social Engineering u Aggravating a user to the point were they turn off Redemption .

  32. Attacking the Malice Score Calculation u Selective content Overwrite u Low entropy payload u Periodic file destruction

  33. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend