Mostrar el registro sencillo del ítem

dc.creatorBerrueta Irigoyen, Eduardoes_ES
dc.creatorMorató Osés, Danieles_ES
dc.creatorMagaña Lizarrondo, Eduardoes_ES
dc.creatorIzal Azcárate, Mikeles_ES
dc.date.accessioned2023-01-30T09:09:01Z
dc.date.available2023-01-30T09:09:01Z
dc.date.issued2022
dc.identifier.citationBerrueta, E., Morato, D., Magaña, E., & Izal, M. (2022). Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic. Expert Systems with Applications, 209, 118299. https://doi.org/10.1016/j.eswa.2022.118299en
dc.identifier.issn0957-4174
dc.identifier.urihttps://hdl.handle.net/2454/44627
dc.description.abstractRansomware is considered as a significant threat for home users and enterprises. In corporate scenarios, users’ computers usually store only system and program files, while all the documents are accessed from shared servers. In these scenarios, one crypto-ransomware infected host is capable of locking the access to all shared files it has access to, which can be the whole set of files from a workgroup of users. We propose a tool to detect and block crypto-ransomware activity based on file-sharing traffic analysis. The tool monitors the traffic exchanged between the clients and the file servers and using machine learning techniques it searches for patterns in the traffic that betray ransomware actions while reading and overwriting files. This is the first proposal designed to work not only for clear text protocols but also for encrypted file-sharing protocols. We extract features from network traffic that describe the activity opening, closing, and modifying files. The features allow the differentiation between ransomware activity and high activity from benign applications. We train and test the detection model using a large set of more than 70 ransomware binaries from 33 different strains and more than 2,400 h of ‘not infected’ traffic from real users. The results reveal that the proposed tool can detect all ransomware binaries described, including those not used in the training phase. This paper provides a validation of the algorithm by studying the false positive rate and the amount of information from user files that the ransomware could encrypt before being detecteden
dc.description.sponsorshipThis work was supported by Spanish Ministry of Science and Innovation through project PID2019-104451RB-C22/AEI/10.13039/ 501100011033. Open access funding provided by Universidad Pública de Navarra.en
dc.format.mimetypeapplication/pdfen
dc.language.isoengen
dc.publisherElsevieren
dc.relation.ispartofExpert Systems with Applications 209 (2022) 118299en
dc.rights© 2022 The Author(s). This is an open access article under the CC BY licenseen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectCrypto-ransomwareen
dc.subjectFile-sharing trafficen
dc.subjectNetwork securityen
dc.titleCrypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted trafficen
dc.typeArtículo / Artikuluaes
dc.typeinfo:eu-repo/semantics/articleen
dc.date.updated2023-01-30T08:44:55Z
dc.contributor.departmentIngeniería Eléctrica, Electrónica y de Comunicaciónes_ES
dc.contributor.departmentIngeniaritza Elektrikoa, Elektronikoaren eta Telekomunikazio Ingeniaritzareneu
dc.rights.accessRightsAcceso abierto / Sarbide irekiaes
dc.rights.accessRightsinfo:eu-repo/semantics/openAccessen
dc.identifier.doi10.1016/j.eswa.2022.118299
dc.relation.projectIDinfo:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/PID2019-104451RB-C22/ES/en
dc.relation.publisherversionhttps://doi.org/10.1016/j.eswa.2022.118299
dc.type.versionVersión publicada / Argitaratu den bertsioaes
dc.type.versioninfo:eu-repo/semantics/publishedVersionen
dc.contributor.funderUniversidad Pública de Navarra / Nafarroako Unibertsitate Publikoaes


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

© 2022 The Author(s). This is an open access article under the CC BY license
La licencia del ítem se describe como © 2022 The Author(s). This is an open access article under the CC BY license

El Repositorio ha recibido la ayuda de la Fundación Española para la Ciencia y la Tecnología para la realización de actividades en el ámbito del fomento de la investigación científica de excelencia, en la Línea 2. Repositorios institucionales (convocatoria 2020-2021).
Logo MinisterioLogo Fecyt