Ransomware encrypted your files but you restored them from network traffic

dc.contributor.authorBerrueta Irigoyen, Eduardo
dc.contributor.authorMorató Osés, Daniel
dc.contributor.authorMagaña Lizarrondo, Eduardo
dc.contributor.authorIzal Azcárate, Mikel
dc.contributor.departmentIngeniaritza Elektrikoa, Elektronikoaren eta Telekomunikazio Ingeniaritzareneu
dc.contributor.departmentInstitute of Smart Cities - ISCen
dc.contributor.departmentIngeniería Eléctrica, Electrónica y de Comunicaciónes_ES
dc.date.accessioned2020-01-08T12:16:16Z
dc.date.available2020-01-08T12:16:16Z
dc.date.issued2019
dc.description.abstractIn a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium and large companies maintain hardware or software probes that monitor the traffic in critical network links, in order to evaluate service performance, detect security breaches, account for network or service usage, etc. In this paper we suggest using the monitoring capabilities in one of these tools in order to keep a trace of the traffic between the users and the file server. Once the ransomware is detected, the lost files can be recovered from the traffic trace. This includes any user modifications posterior to the last snapshot of periodic backups. The paper explains the problems faced by the monitoring tool, which is neither the client nor the server of the file sharing operations. It also describes the data structures in order to process the actions of users that could be simultaneously working on the same file. A proof of concept software implementation was capable of successfully recovering the files encrypted by 18 different ransomware families.en
dc.description.sponsorshipThis work was supported by Spanish MINECO through project PIT (TEC2015-69417-C2-2-R).en
dc.format.extent7 p.
dc.format.mimetypeapplication/pdfen
dc.identifier.citationE. Berrueta, D. Morato, E. Magaña and M. Izal, 'Ransomware Encrypted Your Files but You Restored Them from Network Traffic,' 2018 2nd Cyber Security in Networking Conference (CSNet), Paris, 2018, pp. 1-7. doi: 10.1109/CSNET.2018.8602978en
dc.identifier.doi10.1109/CSNET.2018.8602978
dc.identifier.isbn978-1-5386-7045-3
dc.identifier.urihttps://academica-e.unavarra.es/handle/2454/36012
dc.language.isoengen
dc.publisherIEEEen
dc.relation.ispartof2018 2nd Cyber Security In Networking Conference, CSnet 2018. Paris, oct. 24-26, 2018en
dc.relation.projectIDinfo:eu-repo/grantAgreement/MINECO//TEC2015-69417-C2-2-R/ES/
dc.relation.publisherversionhttps://doi.org/10.1109/CSNET.2018.8602978
dc.rights©2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other work.en
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess
dc.subjectRansomwareen
dc.subjectServersen
dc.subjectProbesen
dc.subjectToolsen
dc.subjectCryptographyen
dc.subjectMonitoringen
dc.titleRansomware encrypted your files but you restored them from network trafficen
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.type.versioninfo:eu-repo/semantics/acceptedVersion
dspace.entity.typePublication
relation.isAuthorOfPublication66d6a070-df96-4f8b-ba63-cb0a93f576ce
relation.isAuthorOfPublicationcd454059-725e-480a-b896-894e79f307a5
relation.isAuthorOfPublicationc521bf55-a1e7-47b2-ac98-5fbf8c286f7a
relation.isAuthorOfPublicationf829a159-0938-45d1-a352-d28fb297ed0b
relation.isAuthorOfPublication.latestForDiscovery66d6a070-df96-4f8b-ba63-cb0a93f576ce

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2019060240_Berrueta_RansomwareEncrypted.pdf
Size:
288.59 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: