Detecting Ransomware with Honeypot Techniques
Conference paper
Moore, C. 2016. Detecting Ransomware with Honeypot Techniques. 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE. https://doi.org/10.1109/CCC.2016.14
Authors | Moore, C. |
---|---|
Type | Conference paper |
Abstract | Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a honeypot folder could be created and monitored for changes. The investigations determined a suitable method to detect changes to this area. This research investigated methods to implement a honeypot to detect ransomware activity, and selected two options, the File Screening service of the Microsoft File Server Resource Manager feature and EventSentry to manipulate the Windows Security logs. The research developed a staged response to attacks to the system along with thresholds when there were triggered. The research ascertained that witness tripwire files offer limited value as there is no way to influence the malware to access the area containing the monitored files. |
Year | 2016 |
Conference | 2016 Cybersecurity and Cyberforensics Conference (CCC) |
Publisher | IEEE |
Publisher's version | License File Access Level Anyone |
Publication dates | |
Online | 20 Oct 2016 |
Publication process dates | |
Completed | 04 Aug 2016 |
Deposited | 05 Feb 2025 |
Journal citation | pp. 77-81 |
Book title | Cybersecurity and Cyberforensics Conference |
ISBN | 978-1-5090-2657-9 |
978-1-5090-2658-6 | |
Digital Object Identifier (DOI) | https://doi.org/10.1109/CCC.2016.14 |
Web address (URL) of conference proceedings | https://ieeexplore.ieee.org/xpl/conhome/7593909/proceeding?isnumber=7600192&sortType=vol-only-seq |
Copyright holder | © 2016, IEEE |
https://repository.uel.ac.uk/item/88v60
Download files
Publisher's version
Detecting_Ransomware_with_Honeypot_Techniques.pdf | ||
License: All rights reserved | ||
File access level: Anyone |
0
total views1
total downloads0
views this month1
downloads this month