Winning the Ransomware Lottery: A Game-Theoretic Model for Mitigating
Ransomware Attacks
- URL: http://arxiv.org/abs/2107.14578v2
- Date: Sun, 19 Sep 2021 17:18:34 GMT
- Title: Winning the Ransomware Lottery: A Game-Theoretic Model for Mitigating
Ransomware Attacks
- Authors: Erick Galinkin
- Abstract summary: We construct an expected value model based on data from actual ransomware attacks.
We present mitigations to encourage an environment that is hostile to ransomware operators.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Ransomware is a growing threat to individuals and enterprises alike,
constituting a major factor in cyber insurance and in the security planning of
every organization. Although the game theoretic lens often frames the game as a
competition between equals -- a profit maximizing attacker and a loss
minimizing defender -- the reality of many situations is that ransomware
organizations are not playing a non-cooperative game, they are playing a
lottery. The wanton behavior of attackers creates a situation where many
victims are hit more than once by ransomware operators, sometimes even by the
same group. If defenders wish to combat malware, they must then seek to remove
the incentives of it.
In this work, we construct an expected value model based on data from actual
ransomware attacks and identify three variables: the value of payments, the
cost of an attack, and the probability of payment. Using this model, we
consider the potential to manipulate these variables to reduce the profit
motive associated with ransomware attack. Based on the model, we present
mitigations to encourage an environment that is hostile to ransomware
operators. In particular, we find that off-site backups and government
incentives for their adoption are the most fruitful avenue for combating
ransomware.
Related papers
- Assessing and Prioritizing Ransomware Risk Based on Historical Victim Data [0.0]
We present an approach to identifying which ransomware adversaries are most likely to target specific entities.
Ransomware poses a formidable cybersecurity threat characterized by profit-driven motives, a complex underlying economy supporting criminal syndicates, and the overt nature of its attacks.
arXiv Detail & Related papers (2025-02-06T15:57:56Z) - Ransomware IR Model: Proactive Threat Intelligence-Based Incident Response Strategy [0.0]
There is no clear and proven published incident response strategy to satisfy different business priorities and objectives under ransomware attack in detail.
In this paper, we quote one of our representative front-line ransomware incident response experiences for Company X.
arXiv Detail & Related papers (2025-02-03T10:25:26Z) - Showing the Receipts: Understanding the Modern Ransomware Ecosystem [4.058903075267789]
We present novel techniques to identify ransomware payments with low false positives.
We publish the largest public dataset of over $900 million in ransomware payments.
We then leverage this expanded dataset to present an analysis focused on understanding the activities of ransomware groups over time.
arXiv Detail & Related papers (2024-08-27T21:51:52Z) - Obfuscated Memory Malware Detection [2.0618817976970103]
We show how Artificial Intelligence and Machine learning can be used to detect and mitigate these cyber-attacks induced by malware in specific obfuscated malware.
We propose a multi-class classification model to detect the three types of obfuscated malware with an accuracy of 89.07% using the Classic Random Forest algorithm.
arXiv Detail & Related papers (2024-08-23T06:39:15Z) - EGAN: Evolutional GAN for Ransomware Evasion [0.0]
Adversarial Training is a proven defense strategy against adversarial malware.
This work proposes an attack framework, EGAN, to address this limitation.
arXiv Detail & Related papers (2024-05-20T17:52:40Z) - Understanding crypter-as-a-service in a popular underground marketplace [51.328567400947435]
Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs) applications.
The crypter-as-a-service model has gained popularity, in response to the increased sophistication of detection mechanisms.
This paper provides the first study on an online underground market dedicated to crypter-as-a-service.
arXiv Detail & Related papers (2024-05-20T08:35:39Z) - The Best Defense is a Good Offense: Adversarial Augmentation against
Adversarial Attacks [91.56314751983133]
$A5$ is a framework to craft a defensive perturbation to guarantee that any attack towards the input in hand will fail.
We show effective on-the-fly defensive augmentation with a robustifier network that ignores the ground truth label.
We also show how to apply $A5$ to create certifiably robust physical objects.
arXiv Detail & Related papers (2023-05-23T16:07:58Z) - DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified
Robustness [58.23214712926585]
We develop a certified defense, DRSM (De-Randomized Smoothed MalConv), by redesigning the de-randomized smoothing technique for the domain of malware detection.
Specifically, we propose a window ablation scheme to provably limit the impact of adversarial bytes while maximally preserving local structures of the executables.
We are the first to offer certified robustness in the realm of static detection of malware executables.
arXiv Detail & Related papers (2023-03-20T17:25:22Z) - Being Single Has Benefits. Instance Poisoning to Deceive Malware
Classifiers [47.828297621738265]
We show how an attacker can launch a sophisticated and efficient poisoning attack targeting the dataset used to train a malware classifier.
As opposed to other poisoning attacks in the malware detection domain, our attack does not focus on malware families but rather on specific malware instances that contain an implanted trigger.
We propose a comprehensive detection approach that could serve as a future sophisticated defense against this newly discovered severe threat.
arXiv Detail & Related papers (2020-10-30T15:27:44Z) - Deflecting Adversarial Attacks [94.85315681223702]
We present a new approach towards ending this cycle where we "deflect" adversarial attacks by causing the attacker to produce an input that resembles the attack's target class.
We first propose a stronger defense based on Capsule Networks that combines three detection mechanisms to achieve state-of-the-art detection performance.
arXiv Detail & Related papers (2020-02-18T06:59:13Z) - Adversarial Attacks on Linear Contextual Bandits [87.08004581867537]
Malicious agents may have incentives to attack the bandit algorithm to induce it to perform a desired behavior.
We show that a malicious agent can force a linear contextual bandit algorithm to pull any desired arm $T - o(T)$ times over a horizon of $T$ steps.
We also investigate the case when a malicious agent is interested in affecting the behavior of the bandit algorithm in a single context.
arXiv Detail & Related papers (2020-02-10T15:04:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.