Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker
Metadatos
Mostrar el registro completo del ítemEditorial
John Wiley & Sons
Fecha
2021-09-18Referencia bibliográfica
Gómez-Hernández, J.A., Sánchez-Fernández, R., García-Teodoro, P.: Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. IET Inf. Secur. 1– 11 (2021). [https://doi.org/10.1049/ise2.12042]
Patrocinador
Spanish Government TIN2017-83494-RResumen
After several years, crypto‐ransomware attacks still constitute a principal threat for individuals
and organisations worldwide. Despite the fact that a number of solutions are
deployed to fight against this plague, one main challenge is that of early reaction, as
merely detecting its occurrence can be useless to avoid the pernicious effects of the
malware. With this aim, the authors introduced in a previous work a novel antiransomware
tool for Unix platforms named R‐Locker. The proposal is supported on a
honeyfile‐based approach, where ‘infinite’ trap files are disseminated around the target
filesystem for early detection and to effectively block the ransomware action. The authors
extend here the tool with three main new contributions. First, R‐Locker is migrated to
Windows platforms, where specific differences exist regarding FIFO handling. Second,
the global management of the honeyfiles around the target filesystem is now improved to
maximise protection. Finally, blocking suspicious ransomware is (semi)automated
through the dynamic use of white‐/black‐lists. As in the original work for Unix systems,
the new Windows version of R‐Locker shows high effectivity and efficiency in
thwarting ransomware action.