Detecting Ransomware with Honeypot Techniques

Conference paper


Moore, C. 2016. Detecting Ransomware with Honeypot Techniques. 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE. https://doi.org/10.1109/CCC.2016.14
AuthorsMoore, C.
TypeConference paper
Abstract

Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a honeypot folder could be created and monitored for changes. The investigations determined a suitable method to detect changes to this area. This research investigated methods to implement a honeypot to detect ransomware activity, and selected two options, the File Screening service of the Microsoft File Server Resource Manager feature and EventSentry to manipulate the Windows Security logs. The research developed a staged response to attacks to the system along with thresholds when there were triggered. The research ascertained that witness tripwire files offer limited value as there is no way to influence the malware to access the area containing the monitored files.

Year2016
Conference2016 Cybersecurity and Cyberforensics Conference (CCC)
PublisherIEEE
Publisher's version
License
File Access Level
Anyone
Publication dates
Online20 Oct 2016
Publication process dates
Completed04 Aug 2016
Deposited05 Feb 2025
Journal citationpp. 77-81
Book titleCybersecurity and Cyberforensics Conference
ISBN978-1-5090-2657-9
978-1-5090-2658-6
Digital Object Identifier (DOI)https://doi.org/10.1109/CCC.2016.14
Web address (URL) of conference proceedingshttps://ieeexplore.ieee.org/xpl/conhome/7593909/proceeding?isnumber=7600192&sortType=vol-only-seq
Copyright holder© 2016, IEEE
Permalink -

https://repository.uel.ac.uk/item/88v60

Download files


Publisher's version
Detecting_Ransomware_with_Honeypot_Techniques.pdf
License: All rights reserved
File access level: Anyone

  • 0
    total views
  • 1
    total downloads
  • 0
    views this month
  • 1
    downloads this month

Export as

Related outputs

An Analysis of Honeypot Programs and the Attack Data Collected
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.