Encryption analysis of AES-Cipher Block Chaining performance in Crypto-Wall Ransomware and SDN based mitigation
-
2018-04-25 https://doi.org/10.14419/ijet.v7i2.24.11997 -
AES, Cipher Block Chaining, CryptoWall, Ransomware, Software Defined Networking. -
Abstract
The arrival of affordable high speed internet and superior computing processors has given the ability to access a novel environment of opportunities and challenges at an individuals fingertips. Sectors of education, administration, business, medical and corporate have been revolutionised by this latest onset of technology. With the arrival of IoT (Internet of Things), the number of devices that are connected to the internet will be higher than ever before. Along with this increase, the diversity of threats propagating on the internet will see a comparable increase. These threats are designed in a way to alter the integrity of the data, embed itself into other programs for further propagation and also to gain monetary compensation. In recent times, the popular malware which has made headlines worldwide is ransomware. This type of malware infection uses complex encryption of user specific files and demands a ransom for retrieval of these files. Modern ransomware behaviour indicates propagation of the malware from the host victim to other computers and shared drives within its network. This paper contains in- detailed analysis of ransomware and the currents trends of this malware. The time taken for CryptoWall ransomware encryption using AES- CBC is observed for various data sizes and a SDN approach for ransomware threat mitigation is discussed.
Â
-
References
[1] P. L. Gallegos-Segovia, J. F. Bravo-Torres, V. M. Larios-Rosillo, P. E. Vintimilla-Tapia, I. F. Yuquilima-Albarado and J. D. Jara-Saltos, “Social engineering as an attack vector for ransomware,â€, 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), Pucon, 2017, pp. 1-6.
[2] Sgandurra, Daniele, Luis MuËœnoz-Gonz´alez, Rabih Mohsen, and Emil C. Lupu., “Automated dynamic analysis of ransomware: Benefits, limitations and use for detection.â€, Proceedings of the conference name, arXiv preprint arXiv:1609.03020 (2016).
[3] A. Adamov and A. Carlsson, “The state of ransomware. Trends and mitigation techniques,â€, 2017 IEEE East-West Design & Test Symposium (EWDTS), Novi Sad, 2017, pp. 1-8.
[4] K. Cabaj and W. Mazurczyk, “Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall,â€, IEEE Network, vol. 30, no. 6, pp. 14-20, November-December 2016.
[5] D. Caivano, G. Canfora, A. Cocomazzi, A. Pirozzi and C. A. Visaggio, “Ransomware at X-Rays,â€, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, 2017, pp. 348-353.
[6] J. Chen, C.Wang, Z. Zhao, K. Chen, R. Du and G. J. Ahn, “Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection,â€, IEEE Transactions on Information Forensics and Security,, vol. 13, no. 5, pp. 1286-1300, May 2018.
[7] Neha Kamdar, Vinita Sharma, Abhishek Sengar and Rahul Tiwari, “Detection and prevention of Rreq flooding attack through filtering schemeâ€, International Journal of Research In Technology and Management (IJRTM), Volume 3 Issue 3, June 2017.
[8] Qian Chen, Robert A. Bridges, “Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware â€, 2017 16th IEEE International Conference on Machine Learning and Applications, 2017, pp. 454-460.
[9] J. A. H. Silva and M. Hern´andez-Alvarez, “Large scale ransomware detection by cognitive security,â€, 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM), Salinas, 2017, pp. 1-4.
[10] S. Chadha and U. Kumar, “Ransomware: Let’s fight back!,â€, 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida,, 2017, pp. 925-930.
[11] Amirali Sanatinia, Guevara Noubir, “OnionBots: Subverting Privacy Infrastructure for Cyber Attacksâ€, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015, pp.69-80.
[12] S. Bhattacharya and C. R. S. Kumar, “Ransomware: The CryptoVirus subverting cloud security,â€, 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), Chennai, 2017, pp. 1-6.
[13] Cabaj Krzysztof, Gregorczyk Marcin, MazurczykWojciech, “Softwaredefined networking-based crypto ransomware detection using HTTP traffic characteristicsâ€, Computers and Electrical Engineering, 2017, pp. 1-16.
[14] R. Shinde, P. Van der Veeken, S. Van Schooten and J. van den Berg, “Ransomware: Studying transfer and mitigation,â€, 2016 International Conference on Computing, Analytics and Security Trends (CAST), Pune, 2016, pp. 90-95.
[15] D. Kreutz, F. M. V. Ramos, P. E. Ver´ıssimo, C. E. Rothenberg, S. Azodolmolky and S. Uhlig, “Software-Defined Networking: A Comprehensive Survey,â€, Proceedings of the IEEE, ol. 103, no. 1, pp. 14-76, Jan. 2015.
[16] D. Gopi, S. Cheng and R. Huck, “Comparative analysis of SDN and conventional networks using routing protocols,â€, 2017 International Conference on Computer, Information and Telecommunication Systems (CITS), Dalian, 2017, pp. 108-112.
[17] I. Ahmad, S. Namal, M. Ylianttila and A. Gurtov, “Security in Software Defined Networks: A Survey,â€, IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2317-2346, Fourthquarter 2015.
[18] Zhaogang Shu, Jiafu Wan, Di Li, Jiaxiang Lin, Athanasios V Vasilakos, Muhammad Imran, “Security in Software-Defined Networking: Threats and Countermeasuresâ€, Mobile Networks and Applications, Vol.21, No.5, (2016), pp.764-776.
[19] A. Feghali, R. Kilany and M. Chamoun, “SDN security problems and solutions analysis,â€, 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, 2015, pp. 1-5.
[20] M. Dabbagh, B. Hamdaoui, M. Guizani and A. Rayes, “Softwaredefined networking security: pros and cons,â€, IEEE Communications Magazine, vol. 53, no. 6, pp. 73-79, June 2015.
[21] Mehdi, Akbar Syed, Junaid Khalid, Syed Ali Khayam, “Revisiting Traffic Anomaly Detection Using Software Defined Networkingâ€, Proceedings of the conference name, Springer Berlin Heidelberg (2011), pp.161-180.
[22] Mehdi, Akbar Syed, Junaid Khalid, Syed Ali Khayam, “Revisiting Traffic Anomaly Detection Using Software Defined Networkingâ€, Proceedings of the conference name, Springer Berlin Heidelberg (2011), pp.161-180.
[23] R. Jin and B. Wang, “Malware Detection for Mobile Devices Using Software-Defined Networking,â€, 2013 Second GENI Research and Educational Experiment Workshop, Salt Lake City, UT, 2013, pp. 81- 88.
[24] Seungwon Shin and Guofei Gu, “CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?),â€, 012 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, 2012, pp. 1-6.
[25] W. Yost and C. Jaiswal, “MalFire: Malware firewall for malicious content detection and protection,â€, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, 2017, pp. 428-433.
[26] M. Vaidehi and B. J. Rabi, “Design and analysis of AES-CBC mode for high security applications,â€, Second International Conference on Current Trends In Engineering and Technology - ICCTET 2014, Coimbatore, 2014, pp. 499-502.
[27] G. C. Prasetyadi, A. Benny Mutiara and R. Refianti, “File encryption and hiding application based on advanced encryption standard (AES) and append insertion steganography method,â€, 2017 Second International Conference on Informatics and Computing (ICIC), Jayapura, 2017, pp. 1-5.
[28] S.V. Manikanthan , T. Padmapriya “An enhanced distributed evolved node-b architecture in 5G tele-communications network†International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018
[29] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
[30] S.V. Manikanthan, T. Padmapriya, Relay Based Architecture For Energy Perceptive For Mobile Adhoc Networks, Advances and Applications in Mathematical Sciences, Volume 17, Issue 1, November 2017, Pages 165-179
-
Downloads
-
How to Cite
Pillai, A., S. Vasanthi, M., Kadikar, R., & Amutha, B. (2018). Encryption analysis of AES-Cipher Block Chaining performance in Crypto-Wall Ransomware and SDN based mitigation. International Journal of Engineering & Technology, 7(2.24), 47-54. https://doi.org/10.14419/ijet.v7i2.24.11997Received date: 2018-04-24
Accepted date: 2018-04-24
Published date: 2018-04-25