Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules

Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Citations (Scopus)
353 Downloads (Pure)

Abstract

Ransomware is currently one of the most significant cyberthreats to both national infrastructure and the individual, often requiring severe treatment as an antidote. Triaging ransomware based on its similarity with well-known ransomware samples is an imperative preliminary step in preventing a ransomware pandemic. Selecting the most appropriate triaging method can improve the precision of further static and dynamic analysis in addition to saving significant time and effort. Currently, the most popular and proven triaging methods are fuzzy hashing, import hashing and YARA rules, which can ascertain whether, or to what degree, two ransomware samples are similar to each other. However, the mechanisms of these three methods are quite different and their comparative assessment is difficult. Therefore, this paper presents an evaluation of these three methods for triaging the four most pertinent ransomware categories WannaCry, Locky, Cerber and CryptoWall. It evaluates their triaging performance and run-time system performance, highlighting the limitations of each method.
Original languageEnglish
Title of host publicationFuzzy Systems (FUZZ-IEEE), IEEE International Conference
Place of PublicationPiscataway, NJ
PublisherIEEE
Number of pages6
ISBN (Electronic)9781538617281
ISBN (Print)9781538617298
DOIs
Publication statusPublished - Jun 2019
Event2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) - JW Marriot New Orleans, New Orleans, United States
Duration: 23 Jun 201926 Jun 2019

Conference

Conference2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
Abbreviated titleFUZZ-IEEE 2019
Country/TerritoryUnited States
CityNew Orleans
Period23/06/1926/06/19

Fingerprint

Dive into the research topics of 'Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules'. Together they form a unique fingerprint.

Cite this