英文摘要
|
Recently, the ransomware were installed thru the use of malicious links and downloads, that kidnapped important files of organizations for money blackmail or bitcoins, especially focused on commercial banks and medical services, and public companies. Consequently, it raised a high crisis of information security management for corporates. Accordingly, the present study proposes a formal concept analysis-based security management system for Ransomware detection with malware sandbox analysis platform by analyzing the bahivoral features of malware. Then, using LeNet-5 Convolutional Neural Networks to learn the behavior of the ransomware classes for classify the pattern by using behavior characteristic matrix of the ransomware. Experimental data show that our model is capable of performing the missions including of i) explicitly identifying the mapping relations between Ransomware classes and their behavioral features, ii) As a basis of detection rules for network intrusion detection to classify the Ransomware families and their variations, and (iii) assist manager detect the malicious intrusion or illegal downloads for Ransomware from cyber threats with high accuracy and low false rate.
|
参考文献
|
-
林孝忠,王帄,洪維謙(2019)。網路勒索病毒的特徵分析與知識本體模型建構。Communications of the CCISA,25(2),37-58。
連結:
-
洪維謙,王帄(2019)。崑山科技大學資訊管理系。
連結:
-
Wikipedia, LeNet, https://en.wikipedia.org/wiki/LeNet (2019/11/11)
-
Wikipedia, “Formal Concept Analysis,http://en.wikipedia.org/wiki/Formal_concept_analysis). (2019/06/10)
-
Wikipedia, Convolutional neural network, https://en.wikipedia.org/wiki/Convolutional_neural_network (2017/09/15)
-
Wikipedia, WannaCry, https://zh.wikipedia.org/wiki/WannaCry.(2019/10/27)
-
ANYRUN - Interactive Online Malware Sandbox, https://app.any.run/ (2019/06/13)
-
A. Endermanch, MalwareDatabase, https://github.com/Endermanch/MalwareDatabase) (2019/06/11)
-
HoneyNet, Cuckoo Sandbox, https://github.com/cuckoosandbox/cuckoo) (2019/06/10)
-
Javaid, A. Y.,Niyaz, Q.,Sun, W.,Alam, M.(2015).A Deep Learning Approach for Network Intrusion Detection System.Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies
-
Jinni, Hub of Tutorials, tutorialjinni.com, https://www.tutorialjinni.com(2019/06/13)
-
Y. Nativ, theZoo, (available online at https://github.com/ytisf/theZoo) (2019/03/08)
-
Noy, N.F.,McGuinness, D.L.(2001).Stanford Knowledge Systems LaboratoryTechnical ReportStanford Knowledge Systems LaboratoryTechnical Report,未出版
-
A. Rosebrock, Rants, “Get off the deep learning bandwagon and get some perspective, Machine Learning, 2014,https://www.pyimagesearch.com/2014/06/09/get-deep-learning-bandwagon-get-perspective/
-
Saxe, J.,Berlin, K.(2015).,未出版
-
Standard University, Protégé, https://protege.stanford.edu/ (2019/03/10)
-
Szegedy, C.,Vanhoucke, V.,Ioffe, S.,Wojna, Z.(2016).Rethinking the Inception Architecture for Computer Vision.Proceedings of the IEEE on Computer Vision and Pattern
-
TechOrange,“ 趨勢科技教你逃離勒索病毒 WannaCry,從今天開始備份、拒當人質!”,2017-05-15,https://buzzorange.com/techorange/2017/05/15/trendmicro-wannacry/. (2019/11/08)
-
Tobiyama, S.,Yamaguchi†, Y.,Shimada, H.,Ikuse, T.,Yagi, T.(2016).Malware Detection with Deep Neural Network using Process Behavior.IEEE 40th Annual Computer Software and Applications Conference
-
Uschold, M.,Gruninger, M.(1996).Ontologies: Principles, Methods and Applications.The Knowledge Engineering Review,11(2)
-
Witten, I. H.,Frank, E.(2005).Data Mining: Practical Machine Learning Tools and Techniques.Morgan Kaufmann Publishers.
-
WordPress, “Fighting malware for better online gaming experiences,” http://www.cuckoobox.org/ (2019/03/10)
-
呂星學(2003)。國防大學國防資訊研究所。
-
科技新報, “深度學習助網路攻擊偵測率升至 99%,NVIDIA 出資力挺”,2017-07-13 , https://technews.tw/2017/07/13/nvidia-investment-deep-instinct/ (2019/11/11)
-
寇廣,湯光明,王碩,宋海濤,邊媛(2016)。深度學習在僵屍雲檢測中的應用研究。通信學報,37(11),114-128。
-
陳智德, “醫療產業駭客威脅日益增加零信任網路成為安全架構之一”, DIGITIMES, 2018-03-09, https://www.digitimes.com.tw/iot/article.asp?cat=158&cat1=20&id=0000525540_9IT4KNVC5HNXBAL6NI23B (2018/11/08)
-
韓曉光,曲武,姚宣霞(2014)。基於紋理指紋的惡意程式碼變種檢測方法研究。通信學報,35(8),125-136。
-
羅正漢, “徹底揭露 2019 年臺灣最大規模病毒攻擊事件勒索軟體衝擊!全臺醫療院所資安拉警報”, iThome, 2019-11-14, https://www.ithome.com.tw/news/134108 (2019/11/11)
|