Loading [MathJax]/extensions/MathMenu.js
A Grammar-Based Behavioral Distance Measure Between Ransomware Variants | IEEE Journals & Magazine | IEEE Xplore

A Grammar-Based Behavioral Distance Measure Between Ransomware Variants


Abstract:

Effective attribution of ransomware attacks requires a way to characterize different variants and estimates their similarity to one another. Unlike other malware, ransomw...Show More

Abstract:

Effective attribution of ransomware attacks requires a way to characterize different variants and estimates their similarity to one another. Unlike other malware, ransomware deliberately discloses itself and interacts explicitly with the victim. This characteristic invites the application of insights from social systems. The resulting behavioral trace offers a richer characterization than the simple code signatures used to detect other forms of malware, but is also more complex and harder to characterize. Exploiting this trace forensically requires a distance measure between pairs of attacks. In the Ransomware Analysis as Dialogue for Attribution and Reconnaissance (RADAR) project, we developed such a measure based on representation of the attack behavior in a context-free grammar. We motivate this approach by insights from behavioral linguistics, summarize the grammar we have developed, present a series of increasingly refined grammatical distance measures, and illustrate their performance on actual attacks. Then we suggest applications of our distance measure to other problems of social modeling.
Published in: IEEE Transactions on Computational Social Systems ( Volume: 9, Issue: 1, February 2022)
Page(s): 8 - 17
Date of Publication: 05 March 2021

ISSN Information:

Funding Agency:


I. Introduction

Ransomware is a widespread form of malware [1], [2] that renders a computer system unusable (typically by locking it or by encrypting its data) and demanding payment to undo its effects. Unlike other forms of malware, ransomware must disclose itself to its victims and interact with them to achieve the attacker’s objective of financial gain. Thus, it is a distinctly social form of attack, inviting the application of tools from the social sciences to understand and mitigate it.

Contact IEEE to Subscribe

References

References is not available for this document.