图13 IBM推出的FlashSystem运行过程 总结
综上所述,检测技术中可以看出基于网络和文件的检测效果只能在90%左右,很难有用的进步到抱负的环境。基于网络的检测最好是针对特定协议的研究可能效果更好,基于文件的检测更像逆向和病毒分析的逻辑,特性提取是难点。检测效果最好的是基于主机的检测,也是勒索软件行为的检测。但是技术壁垒较高,需要对操作体系、文件体系的各种原理认识,并对勒索软件的重要的文件读写特性统计并利用机器学习建模。基于硬件的检测现在只看到国外的相干芯片厂商有相干机制,国内的厂商现在还在办理“卡脖子”和性能的问题,后续需要有相干的特性才华让国内的ISV的安全厂商利用这些硬件机制,硬件机制的好处是可以极大的分担工作负载的性能和成本,可以将安全软件的性能低沉一个量级。 参考资料
1.https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Analysen-und-Prognosen/Ransomware-Angriffe/Top-10-Massnahmen-Detektion/top-10-massnahmen-detektion_node.html
2.https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a
3.https://www.cert.govt.nz/it-specialists/guides/how-ransomware-happens-and-how-to-stop-it/
4.Akinyemi, Oladipupo et al. “Analysis of the LockBit 3.0 and its infiltration into Advanced’s infrastructure crippling NHS services.” ArXiv abs/2308.05565 (2023): n. pag.
5.https://analyst1.com/ransomware-diaries-volume-1/
6.https://www.malwarebytes.com/blog/business/2022/10/top-5-ransomware-detection-techniques-pros-and-cons-of-each
7.Vehabovic, Aldin et al. “Ransomware Detection and Classification Strategies.” 2022 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) (2022): 316-324.
8.Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac. “A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions”. ACM Computing Surveys, Volume 54, Issue 11s,Article No.: 238, pp 1–37, 2022.
9.E. Kirda, “UNVEIL: A large-scale, automated approach to detecting ransomware (keynote),” 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), Klagenfurt, Austria, 2017, pp. 1-1.
Kolodenker, E., Koch, W., Stringhini, G., & Egele, M. (2017). “PayBreak: Defense Against Cryptographic Ransomware”,Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
11.Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, and Federico Maggi. 2016. ShieldFS: a self-healing, ransomware-aware filesystem. In Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC '16). Association for Computing Machinery, New York, NY, USA, 336–347.
12.Kharraz, A., Kirda, E. (2017). Redemption: Real-Time Protection Against Ransomware at End-Hosts. In: Dacier, M., Bailey, M., Polychronakis, M., Antonakakis, M. (eds) Research in Attacks, Intrusions, and Defenses. RAID 2017. Lecture Notes in Computer Science(), vol 10453. Springer, Cham.
13.Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E. (2015). “Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks”. In: Almgren, M., Gulisano, V., Maggi, F. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2015. Lecture Notes in Computer Science(), vol 9148. Springer, Cham.
14.K. P. Subedi, D. R. Budhathoki and D. Dasgupta, “Forensic Analysis of Ransomware Families Using Static and Dynamic Analysis,” 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 2018, pp. 180-185.
15.Bowen, B.M., Hershkop, S., Keromytis, A.D., Stolfo, S.J. (2009). “Baiting Inside Attackers Using Decoy Documents”. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds) Security and Privacy in Communication Networks. SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 19. Springer, Berlin, Heidelberg.
16.https://www.intel.cn/content/www/cn/zh/architecture-and-technology/vpro/hardware-shield/threat-detection-technology.html
17.https://www.intel.cn/content/dam/www/central-libraries/us/en/documents/2023-03/se-labs-intel-tdt-ransomware-test-report.pdf
18.https://www.eset.com/ca/about/newsroom/corporate-blog/enhancing-ransomware-protection-with-the-intel-vpro-platform-1/
19.https://developer.nvidia.com/blog/supercharge-ransomware-detection-with-ai-enhanced-cybersecurity-solutions/
20.Huang, J., Xu, J., Xing, X., Liu, P., & Qureshi, M. “FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware”. In The 24th ACM Conference on Computer and Communications Security (CCS 2017), Dallas, USA, 2017.
21.https://newsroom.ibm.com/blog-IBM-adds-AI-enhanced-data-resilience-capabilities-to-help-combat-ransomware-and-other-threats-with-enhanced-storage-solutions 黑客&网络安全怎样学习 今天只要你给我的文章点赞,我私藏的网安学习资料一样免费共享给你们,来看看有哪些东西。 1.学习路线图