Mining Ransomware Signatures from Network Traffic

dc.contributor.authorPatel, Darshitkumar
dc.contributor.supervisorLu, Wu-Sheng
dc.contributor.supervisorTraore, Issa
dc.date.accessioned2018-04-06T22:39:17Z
dc.date.available2018-04-06T22:39:17Z
dc.date.copyright2018en_US
dc.date.issued2018-04-06
dc.degree.departmentDepartment of Electrical and Computer Engineering
dc.degree.levelMaster of Engineering M.Eng.en_US
dc.description.abstractRansomware is currently one of the most impactful forms of cyber-attacks available. One of the greatest challenges posed by ransomware is the extremely large number and diversity of ransomware families, and the fact that new ransomware variants are being released by cybercriminals on a regular basis. Despite such troublesome threat landscape, the development of adequate protection mechanisms is lagging far behind. In this project, we studied different ransomware families, and identified several distinctive characteristics and attributes that could be used in early detection of ransomware based on network traffic analysis. To prove our concept, we developed, implemented, and tested a new ruleset for ransomware detection using the SNORT Network Intrusion Detection engine. The long-term goal of the project is to incorporate this ruleset in an evolutionary rule generation model that would enable detecting new ransomware families effectively and efficiently.en_US
dc.description.scholarlevelGraduateen_US
dc.identifier.urihttp://hdl.handle.net/1828/9202
dc.language.isoenen_US
dc.rightsAvailable to the World Wide Weben_US
dc.titleMining Ransomware Signatures from Network Trafficen_US
dc.typeprojecten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Patel_Darshitkumar_MEng_2018.pdf
Size:
3.63 MB
Format:
Adobe Portable Document Format
Description:
Project report
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: