Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring
Abstract
:1. Introduction
- It is a deception-based approach, where a set of decoy files are deployed around the file system to capture the attacker’s attention. The proposal takes advantage of the fact that any ransomware sample must access and manipulate files (either legitimate or traps) to kidnap them.
- The detection process itself relies on a reactive file system monitoring solution that fires alarms when trap files are accessed or changed following a certain suspicious sequence.
- Since the (reactive) solution does not run as long as the traps are not accessed, the detection process itself does not consume significant resources in terms of memory, computation, CPU usage, etc. In other words, a high detection accuracy as well as a lightweight, low consumption detection solution is here provided.
2. Background of Ransomware Detection for Android Platforms
3. Ransomware Detection Based on Honeyfiles
- Attackers waste their time exploring worthless planted assets while you bait them into a trap.
- The moment an attacker interacts with a decoy, the technology begins gathering information that will be used to generate high-fidelity alerts that reduce dwell time and accelerate incident response. That is, an early detection process with low false positive rates is achieved.
- This technology generates threat intelligence, stops lateral movement, and orchestrates threat response and containment, all without human supervision.
3.1. R-Locker: A Particular Honeyfile-Based Ransomware Detection Solution for Linux and Windows
3.1.1. R-Locker Architecture
- F1.
- The ransomware sample will be blocked when it accesses the honeyfile without affecting the rest of the file system.
- F2.
- In addition to blocking the sample, the malicious access is notified and a countermeasure automatically deployed to address the threat.
- R1.
- Effectiveness: The harmful actions of the ransomware on the system must be null or minimized.
- R2.
- Low consumption: To be scalable, less resources in terms of CPU, memory, and storage must be consumed.
- R3.
- Clarity: To be usable by end users, no special privileges for the installation or execution are required.
- R4.
- Transparency: The rest of the applications and services on the system should not be affected.
- R5.
- Simplicity: No complex operations must be required to thwart the threat.
3.1.2. R-Locker for Linux/Unix and Windows
- As an object in the file system, it is manipulated like a conventional file accessible through the File API (open, close, read, write, etc.). This makes a FIFO visible to ransomware.
- A FIFO is also a finite-sized communication channel between two processes, the synchronization between them being automatically managed by the operating system, which simplifies the proposed solution.
- 1.
- First, R-Locker creates a FIFO (mkfifo() system call) that will be the central honeyfile or trap file.
- 2.
- Secondly, the process will open the channel in write-only mode (O_WRONLY) and write to it the necessary bytes to fill it and block the writing process that will act as a monitor. At this point, the trap is ready and waiting for prey.
- 3.
- From here on, when an external process (a supposed ransomware) starts reading the trap, it will finally be blocked by the operating system.
- 4.
- Simultaneously, the writer process, which was stopped, is automatically woken up by the kernel and continues its execution to launch the countermeasures as follows: (i) the identifier of the application that accesses the honeyfile is determined; (ii) the user is notified to kill, if necessary, the corresponding process.
- Dynamic management of honeyfiles. Beyond the general behavior of honeyfiles in R-Locker, an important aspect to consider is their location, that is, how to select and manage the folders in which to place the traps. From the results of the work [67] we conclude that there is not a single order for the selection of folders: some samples make an in-depth selection first, then alphabetically; others make a random selection. Such very different behaviors lead to the conclusion that it is advisable to deploy the traps in all folders in order to achieve complete protection. To do this, instead of replicating the traps, which would force us to have to replicate the monitoring process, we can create links to the central FIFO in each and every folder in the file system.Regarding the selection of files within a folder, ransomware samples make selections according to different criteria. In some cases (e.g., NTFS), entries are returned in alphabetical order. In other cases, files are first prioritized by extension and then selected alphabetically. To address this situation we can create multiple links with names “!..!” and extensions like ‘.doc’, ‘.pdf’, ‘.jpg’, etc. To enhance transparency from the user’s perspective, honeyfiles can also be hidden so that they are invisible to normal user operations.
- Integrated detection and (semi-)automatic response. As previously described, a countermeasure is automatically launched when a honeyfile is accessed. In fact, when a reader process accesses the trap the system resumes the detection process (writer) and notifies the user to take corrective action. For a quicker and easier response, this task has been semi-automatizated in R-Locker by making use of two lists:
- 1.
- A whitelist, which is created at installation time and contains all legal applications on the system. An application from this list that interacts with the trap is automatically unlocked by the monitor.
- 2.
- A blacklist, which contains programs that the user has already identified as malicious. This list is built as malicious processes are identified, such as when tagged by the user in response to the notification system.
4. Lightweight Ransomware Detection in Android Based on inotify()
- Internal memory: Memory where private data are stored, that is, those application data (directory /data/) whose access is under the control of the kernel and the data system (directory /). This is a part of the memory included in the device.
- External memory: Public data are stored in this memory, that is, data that can be shared by applications, such as personal data, photographs, documents, etc., and whose access is controlled by the permissions granted to the applications. This memory is made up of part of the memory included in the device (embedded flash memory) and external SD cards.
4.1. Active System Monitoring
- Resources involved: Given the continuous monitoring of a number of features and parameters of the target system, the consumption regime can be high. In the case of AMon, the battery consumption in a normal use regime is 0.4%, which is not very high on its own but is double compared to the consumption of an antivirus application (both consumptions measured in a Samsung S9 phone with a 3000 mAh battery).
- Offline processing of features: Depending on the detection method used, we can process the data collected inside or outside the phone. In most cases, using ML-based techniques, the processing should be done outside the phone so as not to exhaust the device’s resources, such as the battery.
- Data consumption: If we need to perform off-device processing, an increase in data traffic and greater use of the communication service are expected, which means greater battery consumption as well.
4.2. Reactive System Monitoring
- Listing 1. File system monitoring whith FileObserver().public void recursiveFileObserver(File root, List<File> files) {File[] = list = root.listFiles();if (list != null) {for (File f : list) {if (f.isDirectory()) {FileObserver = new FileObserver(f.getAbsolutePath()) {@Overridepublic void onEvent(int event, @Nullable String path);// Operations to manage the event on the pathFileObserver.startWatching();files.add(f);recursiveFilesList(f, files);}}}}}
4.2.1. FileObserver() Related Patterns Associated to Ransomware
- Overwrite, where the original file is read and its content overwritten over the encrypted one.
- Read–encrypt–delete, where the original file is first read, then the ransomware creates a new file to store the ciphered content, and finally the file is deleted.
- Read–encrypt–overwrite, which is similar to the previous one but the victim file is deleted and overwritten.
5. Experimentation
5.1. FileMonitor Tool
- FR1: The user can start/stop monitoring the files.
- FR2: The user can clear the list of monitored events.
- FR3: The app will show each type of event recorded and the associated path, it being possible to filter the events by typology.
- FR4: The app will show the list of dangerous applications with the corresponding permissions.
- NFR1: Both the interface and the use of the application must be simple and easy to understand.
- NFR2: The list of events must be displayed in an organized manner. A first level will show a summary of the events on a given file; a second level includes a detailed list of them.
- NFR3: The list of dangerous applications also has two levels: first, it is displayed in a summary form; second, the details are displayed by clicking on each one.
- NFR4: File monitoring is possible, even if the application is running in the background.
- Listing 2. Service creation by FileMonitor.@Overridepublic int onStartCommand(Intent intent, int flags, int startId) {if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.O) {createNotificationChannel();} else {CHANNEL_ID= "";Notification notification = new NotificationCompat.Builder(this,CHANNEL_ID).build();startForeground(1, notification);for (File f : observed_files){Log.i("Service:", f.getAbsolutePath());observers.add(new singleFileObserver(f));}Toast.makeText(this,"Initiating Fileobserver() in the folder" +root.getAbsolutePath() + "/",Toast.LENGTH_SHORT).show();return Service.START_STICKY; // Service "sticky" type to avoidbeen stopped by the system}
- Listing 3. Service declaration in background by FileMonitor.<\\application>. . .<service android:name="com.filemonitor.test.fileobserver.FileObserverService" android:enabled="true"></service></aplication><uses-permission ..."android.permission.WRITE_EXTERNAL_STORAGE"/><uses-permission ..."android.permission.WAKE_LOCK"/><uses-permission ..."android.permission.READ_EXTERNAL_STORAGE"/><uses-permission ..."android.permission.FOREGROUND_SERVICE"/><uses-permission ..."android.permission.QUERY_ALL_PACKAGES"/>
- First of all, we need to deploy the honeyfiles throughout all the folders in the external memory directory tree. To make them transparent to the user, they will have a name of the form ‘.<name.extension>’, where ‘.’ is the conventional way to hide files. Both the name and the extension of the file should be attractive to ransomware.
- When access to some of the monitored files is detected by FileObserver(), we must deploy the necessary countermeasures intended to allow, on the one hand, to determine which application presents the observed malicious behavior and, on the other, to stop said process by notifying the user as we already did in R-Locker.For that, a whitelist is used, where the applications installed at the time FileMonitor application is installed are stored in the whitelist as benign applications. This is done by using the QUERY_ALL_PACKAGES permission to collect the list of applications installed on the device before starting the monitoring process. When the ransomware detection occurs, we collect this information again and locate the app (or apps) installed after the monitoring app and that is (or are) the candidate for a malicious behavior. Following the R-Locker scheme, we can kill said process by giving our application the KILL_BACKGROUND_PROCESSES permission. Unlike the detection proposal for Linux and Windows, the one for Android is capable of building a more selective whitelist, since we can select only applications that have the necessary permissions to cause damage to external memory.In addition to the whitelist, we can use, as we already did in R-Locker, the blacklist solution with the objective of detecting and (semi-)automatically stopping different occurring threads of an already known ransomware sample.
5.2. Test Scenario and Results
- A virtual machine with VirtualBox, as a sandbox.
- An Android virtual machine inside the previous VM. This second level of virtualization is made with GenyMotion [79].
- 1.
- A DELETE event, which indicates a file erase operation. Here, file erase (unlink()) means that the information on disk is not really deleted: the file directory entry is deleted but data remains intact since there is an active reference to the file in the kernel (while the file is open). This way, ransomware can access the file but the user cannot. In Figure 4, this is the first operation (see timestamp) on the file ‘Picture98.png’.
- 2.
- Second, the creation of the encrypted version of the file, which usually has the same name and a specific extension (CREATE event). In our case, this operation will generate the encrypted version of the target file: ‘Picture98.png.CoderCrypt’.
- 3.
- A MODIFY event, which reflects that the content of the file is modified, including a potential change in its extension. Finally, the ciphered version of file is written.
Additional Malware Detection Capabilities
5.3. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- World Economic Forum. The Global Risks Report 2022. Report, 2022. Available online: https://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf (accessed on 1 April 2024).
- Dave, D.; Sawhney, G.; Aggarwal, P.; Silswal, N.; Khut, D. The New Frontier of Cybersecurity: Emerging Threats and Innovations. In Proceedings of the 29th International Conference on Telecommunications (ICT), Toba, Indonesia, 8–9 November 2023; pp. 1–6. [Google Scholar] [CrossRef]
- ENISA. Identifying Emerging Cyber Security Threats and Challenges for 2030. Report, 2023. Available online: https://www.enisa.europa.eu/publications/enisa-foresight-cybersecurity-threats-for-2030/@@download/fullReport (accessed on 1 April 2024).
- Cyberdefender. 2024 Cybersecurity Outlook: Navigating the Geopolitical Landscape. Report, 2024. Available online: https://www.bitdefender.com/blog/businessinsights/2024-cybersecurity-outlook-navigating-the-geopolitical-landscape (accessed on 1 April 2024).
- Mao, B.; Liu, J.; Wu, Y.; Kato, N. Security and Privacy on 6G Network Edge: A Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1095–1127. [Google Scholar] [CrossRef]
- Ramezanpour, K.; Jagannath, J.; Jagannath, A. Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective. Comput. Netw. 2023, 221, 109515. [Google Scholar] [CrossRef]
- Ounza, J.E. A taxonomical survey of 5G and 6G security and privacy issues. Glob. J. Eng. Technol. Adv. 2023, 14, 042–060. [Google Scholar] [CrossRef]
- AlSalem, T.S.; Almaiah, M.A.; Lutfi, A. Cybersecurity Risk Analysis in the IoT: A Systematic Review. Electronics 2023, 12, 3958. [Google Scholar] [CrossRef]
- Alnajim, A.M.; Habib, S.; Islam, M.; Thwin, S.M.; Alotaibi, F. A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things. Technologies 2023, 11, 161. [Google Scholar] [CrossRef]
- Kabir, M.A.A.; Elmedany, W.; Sharif, S. Securing IoT Devices Against Emerging Security Threats: Challenges and Mitigation Techniques. J. Cyber Secur. Technol. 2023, 7, 199–223. [Google Scholar] [CrossRef]
- Fei, W.; Ohno, H.; Sampalli, S. A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions. ACM Comput. Surv. 2023, 56, 1–40. [Google Scholar] [CrossRef]
- Cisco. Cybersecurity Threat Trends Report. Report, 2023. Available online: https://umbrella.cisco.com/info/threat-trends-report-cryptomining-malware-phishing-trojans?utm_medium=search-paid&utm_source=google&utm_campaign=UMB_EMEA_EU_EN_GS_Nonbrand_Threats&utm_content=UMB-FY21-Q4-content-ebook-2021-cyber-security-threat-trends&_bt=688773592469&_bk=cyber%20security%20threats&_bm=p&_bn=g&_bg=163296865132&gad_source=1&gclid=Cj0KCQiAzoeuBhDqARIsAMdH14FO0srZ6fvJxiHtWv3sy9aGT8qoKGQdCThFgDM0o3KpIkO4mR5l0GMaAn2DEALw_wcB (accessed on 1 April 2024).
- Splunk. Top 50 Cybersecurity Threats. Report, 2024. Available online: https://www.splunk.com/en_us/form/top-50-security-threats.html?utm_campaign=google_emea_tier2_en_search_generic_security&utm_source=google&utm_medium=cpc&utm_content=Top_50_threats_EB&utm_term=threat%20detection&_bk=threat%20detection&_bt=648467081908&_bm=p&_bn=g&_bg=75654867508&device=c&gad_source=1&gclid=Cj0KCQiAzoeuBhDqARIsAMdH14GHBnvcRbgZgP60TdUOoIMufFM2x_gSW7QxwhFyLHYDE6rWo-wWLhsaAuWGEALw_wcB. (accessed on 1 April 2024).
- Symantec. The 2024 Ransomware Threat Landscape. Report, 2024. Available online: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-threat-landscape-2024 (accessed on 1 April 2024).
- Beaman, C.; Barkworth, A.; Akande, T.D.; Hakak, S.; Khan, M.K. Ransomware: Recent adavances, analysis, challenges and future research directions. Comput. Secur. 2021, 111, 102490. [Google Scholar] [CrossRef]
- Oz, H.; Aris, A.; Levi, A.; Uluagac, L. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput. Surv. 2022, 54, 238. [Google Scholar] [CrossRef]
- Gómez-Hernández, J.A.; García-Teodoro, P.; Rodríguez-Gómez, R. Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges. Electronics 2023, 12, 4494. [Google Scholar] [CrossRef]
- Gibson, C.P.; Banik, S.M. Analyzing the Effect of Ransomware Attacks on Different Industries. In Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 14–16 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Ahmed, M.; Ahmed, W.; Khan, S. Ransomware: Attack, Human Impact and Mitigation. Int. J. Comput. Sci. Inf. Secur. 2020, 18, 73–77. [Google Scholar] [CrossRef]
- Connolly, L.Y.; Wall, D.S.; Lang, M.; Oddson, B. An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability. J. Cybersecur. 2020, 6, tyaa023. [Google Scholar] [CrossRef]
- Kadena, E.; Egyetem, O.; Gupi, M. Human Factors in Cybersecurity: Risks and Impacts. Secur. Sci. J. 2021, 2, 51–64. [Google Scholar] [CrossRef]
- Alsoghyer, S.; Almomani, I. Ransomware Detection System for Android Applications. Electronics 2019, 8, 868. [Google Scholar] [CrossRef]
- Desai, U. A Survey on Android Ransomware and its Detection Methods. Int. Res. J. Eng. Technol. 2019, 6, 3081–3087. [Google Scholar]
- Sharma, S.; Kumar, R.; Krishna, C.R. A survey on analysis and detection of Android ransomware. Concurr. Computat. Pract. Exper. 2021, 33, e6272. [Google Scholar] [CrossRef]
- Begovic, K.; Al-Ali, A.; Malluhi, Q. Cryptographic ransomware encryption detection: Survey. Comput. Secur. 2023, 132, 103349. [Google Scholar] [CrossRef]
- Ameer, M. Android Ransomware Detection using Machine Learning Techniques to Mitigate Adversarial Evasion Attacks. Master’s Thesis, Capital University of Science and Technology, Islamabad, Pakistan, 2019. Available online: https://thesis.cust.edu.pk/UploadedFiles/Madiha%20Thesis%20Final.pdf (accessed on 1 April 2024).
- Alzahrani, N.; Alghazzawi, D. A Review on Android Ransomware Detection Using Deep Learning Techniques. In Proceedings of the 11th International Conference on Management of Digital EcoSystems, Limassol, Cyprus, 12–14 November 2019; pp. 330–335. [Google Scholar] [CrossRef]
- Bagui, S.; Woods, T. Machine Learning for Android Ransomware Detection. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 2021, 19, 29–38. [Google Scholar] [CrossRef]
- Alraizza, A.; Algarni, A. Ransomware Detection Using Machine Learning: A Survey. Big Data Cogn. Comput. 2023, 7, 143. [Google Scholar] [CrossRef]
- Slates, W. A Survey of Mobile Ransomware Detection on the Android Platform; University Honors Program; California State University: Long Beach, CA, USA, 2019; Available online: https://scholarworks.calstate.edu/downloads/028712218 (accessed on 1 April 2024).
- Cen, M.; Jiang, F.; Qin, X.; Jiang, Q.; Doss, R. Ransomware early detection: A survey. Comput. Netw. 2024, 239, 110138. [Google Scholar] [CrossRef]
- Gómez-Hernández, J.A.; Álvarez-González, L.; García-Teodoro, P. R-Locker: Thwarting Ransomware Action through a Honeyfile-based Approach. Comput. Secur. 2018, 73, 389–398. [Google Scholar] [CrossRef]
- Gómez-Hernández, J.A.; Sánchez-Fernández, R.; García-Teodoro, P. Inhibiting Crypto-Ransomware on Windows Platforms through a Honeyfile-based Approach with R-Locker. IET Inf. Secur. 2021, 6, 64–74. [Google Scholar] [CrossRef]
- Razgallah, A.; Khoury, R.; Hallé, S.; Khanmohammadi, K. A survey of malware detection in Android apps: Recommendations and perspectives for future research. Comput. Sci. Rev. 2021, 39, 100358. [Google Scholar] [CrossRef]
- Scalas, M.; Maiorca, D.; Mercaldo, F.; Visaggio, C.A.; Martinelli, F.; Giacinto, G. On the effectiveness of system API-related information for Android ransomware detection. Comput. Secur. 2019, 86, 168–182. [Google Scholar] [CrossRef]
- Alzahrani, A.; Alshahrani†, H.; Alshehri, A.; Fu, H. An Intelligent Behavior-Based Ransomware Detection System For Android Platform. In Proceedings of the First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Los Angeles, CA, USA, 12–14 December 2019; pp. 28–35. [Google Scholar] [CrossRef]
- Almohaini, R.; Almomani, I.; AlKhayer, A. Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems. Appl. Sci. 2021, 11, 10976. [Google Scholar] [CrossRef]
- Arora, L.; Kumar, K. Android Ransomware Detection Toolkit. In Proceedings of the 4th International Conference on Artificial Intelligence and Speech Technology (AIST), Delhi, India, 9–10 December 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Abdullah1, Z.; Muhadi, F.W.; Saudi, M.M.; Hamid, I.R.A.; Foozy, C.F.M. Android Ransomware Detection Based on Dynamic Obtained Features. In Proceedings of the International Conference on Soft Computing and Data Mining: Recent Advances on Soft Computing and Data Mining, Melaka, Malaysia, 22–23 January 2020; pp. 121–129. [Google Scholar] [CrossRef]
- Chen, J.; Wang, C.; Zhao, Z.; Chen, K.; Du, R.; Ahn, G.J. Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1286–1300. [Google Scholar] [CrossRef]
- Faghihi, F.; Zulkernine, M. RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware. Comput. Netw. 2021, 191, 108011. [Google Scholar] [CrossRef]
- Manzil, H.H.R.; Naik, S.M. Android ransomware detection using a novel hamming distance based feature selection. J. Comput. Virol. Hacking Tech. 2023, 20, 71–93. [Google Scholar] [CrossRef]
- Sharma, S.; Krishna, C.R.; Kumar, R. An Ensemble-based Supervised Machine Learning Framework for Android Ransomware Detection. Int. Arab. J. Inf. Technol. 2021, 18, 422–429. [Google Scholar] [CrossRef]
- Sharma, S.; Krishna, C.R.; Kumar, R. RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique. Forensic Sci. Int. Digit. Investig. 2021, 37, 301168. [Google Scholar] [CrossRef]
- Almomani, I.; AlKhayer, A.; Ahmed, M. An Efficient Machine Learning-based Approach for Android v.11 Ransomware Detection. In Proceedings of the 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA), Riyadh, Saudi Arabia, 6–7 April 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Almomani, I.; Qaddoura, R.; Habib, M.; Alsoghyer, S.; Khayer, A.; Aljarah, I.; Faris, H. Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data. IEEE Access 2021, 9, 57674–57691. [Google Scholar] [CrossRef]
- Hossain, S.; Hasan, N.; Samad, A.; Shakhawat, H.; Karmoker, J.; Ahmed, F.; Fuad, K.F.M.N.; Choi, K. Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection. IEEE Access 2022, 10, 128754–128763. [Google Scholar] [CrossRef]
- Ahmed1, O.S.; Al-Dabbagh, O.A.I. Ransomware Detection System Based on Machine Learning. J. Educ. Sci. 2021, 30, 86–102. [Google Scholar] [CrossRef]
- Jose, A.; Priyadharsini, C.; Praise1, P.M.; Kathrine, G.J.W.; Andrew, J. Detection of Android Ransomware Using Machine Learning Approach. In International Conference on Applications and Techniques in Information Security; Springer: Singapore, 2022; pp. 191–203. [Google Scholar] [CrossRef]
- Li, D.; Shi, W.; Lu, N.; Lee, S.S.; Lee, S. ARdetector: Android ransomware detection framework. J. Supercomput. 2024, 80, 7557–7584. [Google Scholar] [CrossRef]
- Kirubavathi, G.; Sreevarsan, S.; Varadhan, P. Behavioural Based Detection of Android Ransomware Using Machine Learning Techniques. Res. Sq. Prepr. 2023. [Google Scholar] [CrossRef]
- Ngirande, H.; Muduva, M.; Chiwariro, R.; Makate, A. Detection and Analysis of Android Ransomware Using the Support Vector Machines. Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET) 2024, 12, 241–252. [Google Scholar] [CrossRef]
- Ahmed, A.A.; Shaahid, A.; Alnasser, F.; Alfaddagh, S.; Binagag, S.; Alqahtani, D. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis. Sensors 2024, 24, 189. [Google Scholar] [CrossRef] [PubMed]
- Damodaran, A.; Troia, F.D.; Corrado, V.A.; Austin, T.H.; Stamp, M. A Comparison of Static, Dynamic, and Hybrid Analysis for Malware Detection. J. Comput. Virol. Hack. Tech. 2017, 13, 1–23. [Google Scholar] [CrossRef]
- Wang, Z.; Wu, X.; Liu, C.; Liu, Q.; Zhang, J. RansomTracer: Exploiting Cyber Deception for Ransomware Tracing. In Proceedings of the IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, China, 18–21 June 2018; pp. 227–234. [Google Scholar] [CrossRef]
- Han, X.; Kheir, N.; Balzarotti, D. Deception Techniques in Computer Security: A Research Perspective. ACM Comput. Surv. 2019, 51, 80. [Google Scholar] [CrossRef]
- Denham, B.; Thompson, D.R. Analysis of Decoy Strategies for Detecting Ransomware. In Proceedings of the 2023 IEEE Conference on Communications and Network Security (CNS), Orlando, FL, USA, 2–5 October 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Patel, A.; Tailor, J.P. A malicious activity monitoring mechanism to detect and prevent ransomware. Comput. Fraud. Secur. 2020, 2020, 14–19. [Google Scholar] [CrossRef]
- Moussaileb, R.; Bouget, B.; Palisse, A.; Bouder, H.L.; Cuppens-Boulahia, N.; Lanet, J.L. Ransomware’s Early Mitigation Mechanisms. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018; pp. 1–10. [Google Scholar] [CrossRef]
- Lee, J.; Lee, J.; Hong, J. How to Make Efficient Decoy Files for Ransomware Detection? In Proceedings of the International Conference on Research in Adaptive and Convergent Systems (RACS’17), Krakow, Poland, 20–23 September 2017; pp. 208–212. [Google Scholar] [CrossRef]
- Kharraz, A.; Arshad, S.; Mulliner, C.; Robertson, W.; Kirda, E. UNVEIL: A large-scale, automated approach to detecting ransomware. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016; pp. 757–772. Available online: https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_kharraz.pdf (accessed on 1 April 2024).
- Moore, C. Detecting Ransomware with Honeypot Techniques. In Proceedings of the Cybersecurity and Cyberforensics Conference (CCC), Amman, Jordan, 2–4 August 2016; pp. 77–81. [Google Scholar] [CrossRef]
- Mehnaz, S.; Mudgerikar, A.; Bertino, E. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. In Research in Attacks, Intrusions, and Defenses; Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S., Eds.; RAID 2018, Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2018; Volume 11050. [Google Scholar] [CrossRef]
- Shaukat, S.K.; Ribeiro, V.J. RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning. In Proceedings of the 10th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, 3–7 January 2018; pp. 356–363. [Google Scholar] [CrossRef]
- Al-Nemera, G.; Al-Otaibi, S.; Tahir, R.; Alkhatib, M. Making Honey Files Sweeter: SentryFS-A Service-Oriented Smart Ransomware Solution. arXiv 2021, arXiv:2108.12792. [Google Scholar] [CrossRef]
- Wang, S.; Zhang, H.; Qin, S.; Li, W.; Tu, T.; Shen, A.; Liu, W. KRProtector: Detection and Files Protection for IoT devices on Android without ROOT against Ransomware Based on Decoys. IEEE Internet Things J. 2022, 9, 18251–18266. [Google Scholar] [CrossRef]
- Grant, L.; Parkinson, S. Identifying file interaction patterns in ransomware behaviour. In Guide to Vulnerability Analysis for Computer Networks and System. An Artificial Intelligent Approach; Parkinson, S., Crampton, A., Hill, R., Eds.; Computer Communication and Network Series; Springer: Cham, Switzerland, 2018; pp. 317–335. [Google Scholar]
- Kerrisk, M. The Linux Programming Interface, October 2010; No Starch Press: Sanfrancisco, CA, USA, 2010; ISBN 978-1-59327-220-3. [Google Scholar]
- Altuwaijri, H.; Ghouzali, S. Android data storage security: A review. J. King Saud Univ.-Comput. Inf. Sci. 2020, 32, 543–552. [Google Scholar] [CrossRef]
- RIP Tutorial. Android Java Native Interface (JNI). Available online: https://sodocumentation.net/android/topic/8674/android-java-native-interface–jni- (accessed on 1 April 2024).
- Microsoft. exFAT File System Specification. Microsoft Docs. Available online: https://learn.microsoft.com/en-us/windows/win32/fileio/exfat-specification (accessed on 1 April 2024).
- Gómez-Hernández, J.A.; García-Teodoro, P.; Holgado-Terriza, J.A.; Maciá-Fernández, G.; Camacho-Páez, J.; Noguera-Comino, J.M. Monitoring Android Communications for Security. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 10–13 May 2021; pp. 1–2. [Google Scholar] [CrossRef]
- García-Teodoro, P.; Camacho, J.; Maciá-Fernández, G.; Gómez-Hernández, J.A.; López-Marín, V.J. A Novel Zero-Trust Network Access Control Scheme based on the Security Profile of Devices and Users. Comput. Netw. 2022, 212, 109068. [Google Scholar] [CrossRef]
- Gómez-Hernández, J.A.; Camacho, J.; Holgado-Terriza, J.A.; García-Teodoro, P.; Maciá-Fernández, G. ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices. IEEE Access 2021, 9, 101321–101334. [Google Scholar] [CrossRef]
- Cabral, R.; McDonald, J.T.; Hively, L.M.; Benton, R.G. Profiling CPU Behavior for Detection of Android Ransomware. In Proceedings of the SoutheastCon 2022, Mobile, AL, USA, 26 March–3 April 2022; pp. 690–697. [Google Scholar] [CrossRef]
- Sheen, S.; Asmitha, K.A.; Venkatesan, S. R-Sentry: Deception based ransomware detection using file access patterns. Comput. Electr. Eng. 2022, 103, 108346. [Google Scholar] [CrossRef]
- Android. FileObserver Abstract Class. Developers Manual. Available online: https://developer.android.com/reference/android/os/FileObserver (accessed on 1 April 2024).
- Chew, C.J.W.; Kumar, V.; Patros, P.; Malik, R. Real-time system call-based ransomware detection. Int. J. Inf. Secur. 2024, 1–20. [Google Scholar] [CrossRef]
- Genymotion. Android Emulator as a Service. Available online: https://www.genymotion.com/ (accessed on 1 April 2024).
- Sk3ptre. Malware Repository. Available online: https://github.com/sk3ptre/AndroidMalware_2020 (accessed on 1 April 2024).
Event | Description |
---|---|
ACCESS | Data has been read from the file |
ALL_EVENTS | All valid event types combined |
ATTRIB | They have changed the metadata explicitly |
CLOSE_NOWRITE | Someone has file/directory open read-only and closed it |
CLOSE_WRITE | Someone has file/directory open for writing and closed it |
CREATE | A file/directory has been created in the monitored folder |
DELETE | A file has been deleted from the monitored directory |
DELETE_SELF | The file/directory in the monitored directory has been deleted; stop monitoring |
MODIFY | File data has been written |
MOVED_FROM | A file or directory was moved from the monitored folder |
MOVED_TO | A file or directory was moved to the monitored folder |
MOVED_SELF | The observed file or directory has been moved; monitoring continues |
OPEN | A file or directory has been opened |
Name | Hash MD5 | Type |
---|---|---|
CookierStealer | 65a92baefd41eb8c1a9df6c266992730 | Spyware |
Covid_SpyPhone | 3288a6cb81bc3e928e438fa280fec847 | Riskware |
Covid_Cerberus | 66c4513025128719dda018820cc0987e | Spy/Dropper |
Crydroid | 381134ea0f0be535b9d2ce8a94093576 | Ransomware |
Cyberpunk | cbd92757051490316de527a02ac17947 | Ransomware |
Joker | 44faa3de0f17491557a3a775c88e7e33 | Spy/Dropper |
Shopaholic | 0a421b0857cfe4d0066246cb87d8768c | Dropper |
ThiefBot | e88867956017bbe5b633811885c87018 | Spyware |
Trickbot | 05c0c1bb23cc06474c3fd3ba51e4e4c6 | Spy/Dropper |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gómez-Hernández, J.A.; García-Teodoro, P. Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring. Sensors 2024, 24, 2679. https://doi.org/10.3390/s24092679
Gómez-Hernández JA, García-Teodoro P. Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring. Sensors. 2024; 24(9):2679. https://doi.org/10.3390/s24092679
Chicago/Turabian StyleGómez-Hernández, José A., and Pedro García-Teodoro. 2024. "Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring" Sensors 24, no. 9: 2679. https://doi.org/10.3390/s24092679
APA StyleGómez-Hernández, J. A., & García-Teodoro, P. (2024). Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring. Sensors, 24(9), 2679. https://doi.org/10.3390/s24092679