redemption real time protection against ransomware at end
play

Redemption: Real-Time Protection Against Ransomware at End-Hosts - PowerPoint PPT Presentation

Redemption: Real-Time Protection Against Ransomware at End-Hosts WRITTEN BY: PRESENTED BY: AMIN KHARRAZ NICHOLAS BURTON ENGIN KIRDA What is Ransomware? What is Ransomware? u Ransomware is malicious software that encrypts user data, and


  1. Redemption: Real-Time Protection Against Ransomware at End-Hosts WRITTEN BY: PRESENTED BY: AMIN KHARRAZ NICHOLAS BURTON ENGIN KIRDA

  2. What is Ransomware?

  3. What is Ransomware? u Ransomware is malicious software that encrypts user data, and demands a ransom is paid to unlock it.

  4. Well that sucks, how do I get my data back?

  5. Data Retrieval u The easiest solution: keep a backup of your files.

  6. Data Retrieval u The easiest solution: keep a backup of your files. u If and when you system is compromised by ransomware, you can use the backup to get back your files.

  7. I don’t have a backup … .

  8. I don’t have a backup … . and I NEED those files!

  9. This is really bad, can I prevent this?

  10. Prevention u CryptoDrop

  11. Prevention u CryptoDrop u SheildFS

  12. Prevention u CryptoDrop u SheildFS u PayBreak

  13. None of those work very well, what now?

  14. Redemption, Real-Time Protection

  15. Redemption Design Overview Two Components of Redemption u A characterization of ransomware behavior based on a large class of current ransomware. u High performance and integrity mechanism to restore attacked files.

  16. Redemption Design Overview

  17. How to determine Malice Score?

  18. Malice Score Two Components of Malice Score Calculation u Content-based features u Behavior-based features

  19. Content-Based Features u Entropy Ratio of Data Blocks (Shannon Entropy)

  20. Content-Based Features u Entropy Ratio of Data Blocks (Shannon Entropy) u File Content Overwrite

  21. Content-Based Features u Entropy Ratio of Data Blocks (Shannon Entropy) u File Content Overwrite u Delete Operations

  22. Behavior-based Features u Directory Traversal

  23. Behavior-based Features u Directory Traversal u Converting Files to a Specific Type

  24. Behavior-based Features u Directory Traversal u Converting Files to a Specific Type u Access Frequency

  25. Why two components of malice score calculation?

  26. Why two components of malice score calculation?

  27. Acceptable Malice Score

  28. Testing Against Other Anti-Ransomware Applications

  29. Overhead

  30. Getting around Redemption

  31. Social Engineering u Aggravating a user to the point were they turn off Redemption .

  32. Attacking the Malice Score Calculation u Selective content Overwrite u Low entropy payload u Periodic file destruction

  33. Questions?

Recommend


More recommend