DeepWare: Imaging Performance Counters With Deep Learning to Detect Ransomware
In the year passed, rarely a month passes without a ransomware incident being published in a newspaper or social media. In addition to the rise in the frequency of ransomware attacks, emerging attacks are very effective as they utilize sophisticated techniques to bypass existing organizational secur...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on computers 2023-03, Vol.72 (3), p.600-613 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 613 |
---|---|
container_issue | 3 |
container_start_page | 600 |
container_title | IEEE transactions on computers |
container_volume | 72 |
creator | Ganfure, Gaddisa Olani Wu, Chun-Feng Chang, Yuan-Hao Shih, Wei-Kuan |
description | In the year passed, rarely a month passes without a ransomware incident being published in a newspaper or social media. In addition to the rise in the frequency of ransomware attacks, emerging attacks are very effective as they utilize sophisticated techniques to bypass existing organizational security perimeter. To tackle this issue, this paper presents "DeepWare," which is a ransomware detection model inspired by deep learning and hardware performance counter (HPC). Different from previous works aiming to check all HPC results returned from a single timing for every running process, DeepWare carries out a simple yet effective concept of " imaging hardware performance counters with deep learning to detect ransomware ," so as to identify ransomware efficiently and effectively. To be more specific, DeepWare monitors the system-wide change in the distribution of HPC data. By imaging the HPC values and restructuring the conventional CNN model, DeepWare can address HPC's nondeterminism issue by extracting the event-specific and event-wise behavioral features, which allows it to distinguish the ransomware activity from the benign one effectively. The experiment results across ransomware families show that the proposed DeepWare is effective at detecting different classes of ransomware with the 98.6% recall score, which is 84.41%, 60.93%, and 21% improvement over RATAFIA , OC-SVM , and EGB models respectively. DeepWare achieves an average MCC score of 96.8% and nearly zero false-positive rates by using just a 100 ms snapshot of HPC data. This timeliness of DeepWare is critical on the ground that organizations and individuals have the opportunity to take countermeasures in the first stage of the attack. Besides, the experiment conducted on unseen ransomware families such as CoronaVirus, Ryuk, and Dharma demonstrates that DeepWare has excellent potential to be a useful tool for zero-day attack detection. |
doi_str_mv | 10.1109/TC.2022.3173149 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2775104799</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9770351</ieee_id><sourcerecordid>2775104799</sourcerecordid><originalsourceid>FETCH-LOGICAL-c335t-a30944d7f023a829be5a52f331b87026d1e4f8c07f840ccd31888335ea23aede3</originalsourceid><addsrcrecordid>eNo9kE1LAzEURYMoWKtrF24GXE_7kkyaxJ2MX4WiIpUuQ5p5U6c4k5qkiP_eGSquHlzOuQ8uIZcUJpSCni7LCQPGJpxKTgt9REZUCJlrLWbHZARAVa55AafkLMYtAMwY6BF5vkPcrWzAm2ze2k3TbbJXDLUPre0cZqXfdwlDzFZN-sgGNlugDd3AJd8HCV3K3mwXffvdt5yTk9p-Rrz4u2Py_nC_LJ_yxcvjvLxd5I5zkXLLQRdFJWtg3Cqm1yisYDXndK0ksFlFsaiVA1mrApyrOFVK9SbanscK-ZhcH3p3wX_tMSaz9fvQ9S8Nk1JQKKTWPTU9UC74GAPWZhea1oYfQ8EMo5llaYbRzN9ovXF1MBpE_Ke1lMAF5b-pbWav</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2775104799</pqid></control><display><type>article</type><title>DeepWare: Imaging Performance Counters With Deep Learning to Detect Ransomware</title><source>IEEE Electronic Library (IEL)</source><creator>Ganfure, Gaddisa Olani ; Wu, Chun-Feng ; Chang, Yuan-Hao ; Shih, Wei-Kuan</creator><creatorcontrib>Ganfure, Gaddisa Olani ; Wu, Chun-Feng ; Chang, Yuan-Hao ; Shih, Wei-Kuan</creatorcontrib><description>In the year passed, rarely a month passes without a ransomware incident being published in a newspaper or social media. In addition to the rise in the frequency of ransomware attacks, emerging attacks are very effective as they utilize sophisticated techniques to bypass existing organizational security perimeter. To tackle this issue, this paper presents "DeepWare," which is a ransomware detection model inspired by deep learning and hardware performance counter (HPC). Different from previous works aiming to check all HPC results returned from a single timing for every running process, DeepWare carries out a simple yet effective concept of " imaging hardware performance counters with deep learning to detect ransomware ," so as to identify ransomware efficiently and effectively. To be more specific, DeepWare monitors the system-wide change in the distribution of HPC data. By imaging the HPC values and restructuring the conventional CNN model, DeepWare can address HPC's nondeterminism issue by extracting the event-specific and event-wise behavioral features, which allows it to distinguish the ransomware activity from the benign one effectively. The experiment results across ransomware families show that the proposed DeepWare is effective at detecting different classes of ransomware with the 98.6% recall score, which is 84.41%, 60.93%, and 21% improvement over RATAFIA , OC-SVM , and EGB models respectively. DeepWare achieves an average MCC score of 96.8% and nearly zero false-positive rates by using just a 100 ms snapshot of HPC data. This timeliness of DeepWare is critical on the ground that organizations and individuals have the opportunity to take countermeasures in the first stage of the attack. Besides, the experiment conducted on unseen ransomware families such as CoronaVirus, Ryuk, and Dharma demonstrates that DeepWare has excellent potential to be a useful tool for zero-day attack detection.</description><identifier>ISSN: 0018-9340</identifier><identifier>EISSN: 1557-9956</identifier><identifier>DOI: 10.1109/TC.2022.3173149</identifier><identifier>CODEN: ITCOB4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>convolutional neural network ; Deep learning ; dynamic analysis ; Encryption ; Feature extraction ; Hardware ; hardware performance counters ; Imaging ; Monitoring ; Ransomware ; Ransomware detection ; Switches</subject><ispartof>IEEE transactions on computers, 2023-03, Vol.72 (3), p.600-613</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c335t-a30944d7f023a829be5a52f331b87026d1e4f8c07f840ccd31888335ea23aede3</citedby><cites>FETCH-LOGICAL-c335t-a30944d7f023a829be5a52f331b87026d1e4f8c07f840ccd31888335ea23aede3</cites><orcidid>0000-0002-6367-0517 ; 0000-0001-8356-2495 ; 0000-0002-1282-2111 ; 0000-0001-8603-3062</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9770351$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9770351$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ganfure, Gaddisa Olani</creatorcontrib><creatorcontrib>Wu, Chun-Feng</creatorcontrib><creatorcontrib>Chang, Yuan-Hao</creatorcontrib><creatorcontrib>Shih, Wei-Kuan</creatorcontrib><title>DeepWare: Imaging Performance Counters With Deep Learning to Detect Ransomware</title><title>IEEE transactions on computers</title><addtitle>TC</addtitle><description>In the year passed, rarely a month passes without a ransomware incident being published in a newspaper or social media. In addition to the rise in the frequency of ransomware attacks, emerging attacks are very effective as they utilize sophisticated techniques to bypass existing organizational security perimeter. To tackle this issue, this paper presents "DeepWare," which is a ransomware detection model inspired by deep learning and hardware performance counter (HPC). Different from previous works aiming to check all HPC results returned from a single timing for every running process, DeepWare carries out a simple yet effective concept of " imaging hardware performance counters with deep learning to detect ransomware ," so as to identify ransomware efficiently and effectively. To be more specific, DeepWare monitors the system-wide change in the distribution of HPC data. By imaging the HPC values and restructuring the conventional CNN model, DeepWare can address HPC's nondeterminism issue by extracting the event-specific and event-wise behavioral features, which allows it to distinguish the ransomware activity from the benign one effectively. The experiment results across ransomware families show that the proposed DeepWare is effective at detecting different classes of ransomware with the 98.6% recall score, which is 84.41%, 60.93%, and 21% improvement over RATAFIA , OC-SVM , and EGB models respectively. DeepWare achieves an average MCC score of 96.8% and nearly zero false-positive rates by using just a 100 ms snapshot of HPC data. This timeliness of DeepWare is critical on the ground that organizations and individuals have the opportunity to take countermeasures in the first stage of the attack. Besides, the experiment conducted on unseen ransomware families such as CoronaVirus, Ryuk, and Dharma demonstrates that DeepWare has excellent potential to be a useful tool for zero-day attack detection.</description><subject>convolutional neural network</subject><subject>Deep learning</subject><subject>dynamic analysis</subject><subject>Encryption</subject><subject>Feature extraction</subject><subject>Hardware</subject><subject>hardware performance counters</subject><subject>Imaging</subject><subject>Monitoring</subject><subject>Ransomware</subject><subject>Ransomware detection</subject><subject>Switches</subject><issn>0018-9340</issn><issn>1557-9956</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEURYMoWKtrF24GXE_7kkyaxJ2MX4WiIpUuQ5p5U6c4k5qkiP_eGSquHlzOuQ8uIZcUJpSCni7LCQPGJpxKTgt9REZUCJlrLWbHZARAVa55AafkLMYtAMwY6BF5vkPcrWzAm2ze2k3TbbJXDLUPre0cZqXfdwlDzFZN-sgGNlugDd3AJd8HCV3K3mwXffvdt5yTk9p-Rrz4u2Py_nC_LJ_yxcvjvLxd5I5zkXLLQRdFJWtg3Cqm1yisYDXndK0ksFlFsaiVA1mrApyrOFVK9SbanscK-ZhcH3p3wX_tMSaz9fvQ9S8Nk1JQKKTWPTU9UC74GAPWZhea1oYfQ8EMo5llaYbRzN9ovXF1MBpE_Ke1lMAF5b-pbWav</recordid><startdate>20230301</startdate><enddate>20230301</enddate><creator>Ganfure, Gaddisa Olani</creator><creator>Wu, Chun-Feng</creator><creator>Chang, Yuan-Hao</creator><creator>Shih, Wei-Kuan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-6367-0517</orcidid><orcidid>https://orcid.org/0000-0001-8356-2495</orcidid><orcidid>https://orcid.org/0000-0002-1282-2111</orcidid><orcidid>https://orcid.org/0000-0001-8603-3062</orcidid></search><sort><creationdate>20230301</creationdate><title>DeepWare: Imaging Performance Counters With Deep Learning to Detect Ransomware</title><author>Ganfure, Gaddisa Olani ; Wu, Chun-Feng ; Chang, Yuan-Hao ; Shih, Wei-Kuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c335t-a30944d7f023a829be5a52f331b87026d1e4f8c07f840ccd31888335ea23aede3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>convolutional neural network</topic><topic>Deep learning</topic><topic>dynamic analysis</topic><topic>Encryption</topic><topic>Feature extraction</topic><topic>Hardware</topic><topic>hardware performance counters</topic><topic>Imaging</topic><topic>Monitoring</topic><topic>Ransomware</topic><topic>Ransomware detection</topic><topic>Switches</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ganfure, Gaddisa Olani</creatorcontrib><creatorcontrib>Wu, Chun-Feng</creatorcontrib><creatorcontrib>Chang, Yuan-Hao</creatorcontrib><creatorcontrib>Shih, Wei-Kuan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on computers</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ganfure, Gaddisa Olani</au><au>Wu, Chun-Feng</au><au>Chang, Yuan-Hao</au><au>Shih, Wei-Kuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DeepWare: Imaging Performance Counters With Deep Learning to Detect Ransomware</atitle><jtitle>IEEE transactions on computers</jtitle><stitle>TC</stitle><date>2023-03-01</date><risdate>2023</risdate><volume>72</volume><issue>3</issue><spage>600</spage><epage>613</epage><pages>600-613</pages><issn>0018-9340</issn><eissn>1557-9956</eissn><coden>ITCOB4</coden><abstract>In the year passed, rarely a month passes without a ransomware incident being published in a newspaper or social media. In addition to the rise in the frequency of ransomware attacks, emerging attacks are very effective as they utilize sophisticated techniques to bypass existing organizational security perimeter. To tackle this issue, this paper presents "DeepWare," which is a ransomware detection model inspired by deep learning and hardware performance counter (HPC). Different from previous works aiming to check all HPC results returned from a single timing for every running process, DeepWare carries out a simple yet effective concept of " imaging hardware performance counters with deep learning to detect ransomware ," so as to identify ransomware efficiently and effectively. To be more specific, DeepWare monitors the system-wide change in the distribution of HPC data. By imaging the HPC values and restructuring the conventional CNN model, DeepWare can address HPC's nondeterminism issue by extracting the event-specific and event-wise behavioral features, which allows it to distinguish the ransomware activity from the benign one effectively. The experiment results across ransomware families show that the proposed DeepWare is effective at detecting different classes of ransomware with the 98.6% recall score, which is 84.41%, 60.93%, and 21% improvement over RATAFIA , OC-SVM , and EGB models respectively. DeepWare achieves an average MCC score of 96.8% and nearly zero false-positive rates by using just a 100 ms snapshot of HPC data. This timeliness of DeepWare is critical on the ground that organizations and individuals have the opportunity to take countermeasures in the first stage of the attack. Besides, the experiment conducted on unseen ransomware families such as CoronaVirus, Ryuk, and Dharma demonstrates that DeepWare has excellent potential to be a useful tool for zero-day attack detection.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TC.2022.3173149</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-6367-0517</orcidid><orcidid>https://orcid.org/0000-0001-8356-2495</orcidid><orcidid>https://orcid.org/0000-0002-1282-2111</orcidid><orcidid>https://orcid.org/0000-0001-8603-3062</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0018-9340 |
ispartof | IEEE transactions on computers, 2023-03, Vol.72 (3), p.600-613 |
issn | 0018-9340 1557-9956 |
language | eng |
recordid | cdi_proquest_journals_2775104799 |
source | IEEE Electronic Library (IEL) |
subjects | convolutional neural network Deep learning dynamic analysis Encryption Feature extraction Hardware hardware performance counters Imaging Monitoring Ransomware Ransomware detection Switches |
title | DeepWare: Imaging Performance Counters With Deep Learning to Detect Ransomware |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T21%3A19%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DeepWare:%20Imaging%20Performance%20Counters%20With%20Deep%20Learning%20to%20Detect%20Ransomware&rft.jtitle=IEEE%20transactions%20on%20computers&rft.au=Ganfure,%20Gaddisa%20Olani&rft.date=2023-03-01&rft.volume=72&rft.issue=3&rft.spage=600&rft.epage=613&rft.pages=600-613&rft.issn=0018-9340&rft.eissn=1557-9956&rft.coden=ITCOB4&rft_id=info:doi/10.1109/TC.2022.3173149&rft_dat=%3Cproquest_RIE%3E2775104799%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2775104799&rft_id=info:pmid/&rft_ieee_id=9770351&rfr_iscdi=true |