Repositorio Dspace

Monitorización, detección y bloqueo de procesos de cifrado malicioso

Mostrar el registro sencillo del ítem

dc.contributor Dantí, Francesc
dc.creator Campos Martín, Víctor
dc.date 2017-10-25T07:57:19Z
dc.date 2017-10-25T07:57:19Z
dc.date 2017-01-19
dc.date.accessioned 2024-12-16T10:25:43Z
dc.date.available 2024-12-16T10:25:43Z
dc.identifier http://hdl.handle.net/2445/117062
dc.identifier.uri http://fima-docencia.ub.edu:8080/xmlui/handle/123456789/19901
dc.description Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2017, Director: Francesc Dantí Espinasa
dc.description This project wants to give a solution to Ransomware, a problem that in 2016 is affecting the biggest amount of users in malware's world. Ransomware is a kind of malware characterized by asking a ransom payment after infecting a device. Firstly they just block the device showing a full screen message until receiving the payment but, in a while, they started using file encryption. Once the files have been encrypted, it is virtually impossible to decipher them without the decryption key. That leaves only the possibility of ransom to recover lost files. During the investigation about ransomware, we found that the vast majority of them used fixed extensions and patterns to rename encrypted files. Somehow, we could use this feature to identify the encryption process in its initial state and kill it. RaMON is a reactive tool that doesn't require installation and designed to consume very little resources. These characteristics make possible to work together with an antivirus as a light and transparent application. We must remember that RaMON has been designed to fight against a very specific type of malware. For this reason, it should be viewed as an additional security layer and in no way a replacing for an antivirus. RaMON has a blacklist with extensions we consider as IOC (Indicator of Compromise). When one of this extensions is detected, a malicious encryption process is taking place. From them, the functionality of the tool follows these steps: - Monitoring File System for detecting creation/rename of new executable files (.exe) - Monitoring creation/rename files with dangerous extensions. - Matching the “Last created EXE’s” list with current process list, in order to find encryption process. - Once found, matches the “Last created EXE’s” list with current process list, in order to find encryption process. After that, it sends a kill signal to it, his sons and threads. - In parallel, disables network interfaces to avoid expansion of the infection. - Sends a shutdown informing the user about the infection. We make this in order to avoid to keep modifying the system, just in case of an eventual forensic analysis. As a last line of defense tool, its performance will only take place if the ransomware has bypassed all other security layers (UAC, execution prevention, antivirus, firewall, etc.). We should note that the computer world in general, and malware in particular, improves at high speed and what is effective today, probably tomorrow will not. The same sources of information serve the blackhat and the whitehat hackers, fueling the fast evolution in the world of security. Most of time we are thinking about improving security applications but sometimes we forget to work hardly in user education, that is always the weakest link in the infection chain.
dc.format 48 p.
dc.format application/pdf
dc.language spa
dc.rights memòria: cc-by-sa (c) Víctor Campos Martín, 2017
dc.rights codi: GPL (c) Víctor Campos Martín, 2017
dc.rights http://creativecommons.org/licenses/by-sa/3.0/es
dc.rights http://www.gnu.org/licenses/gpl-3.0.ca.html
dc.rights info:eu-repo/semantics/openAccess
dc.source Treballs Finals de Grau (TFG) - Enginyeria Informàtica
dc.subject Seguretat informàtica
dc.subject Programari
dc.subject Xifratge (Informàtica)
dc.subject Delictes informàtics
dc.subject Treballs de fi de grau
dc.subject Computer security
dc.subject Computer software
dc.subject Computer crimes
dc.subject Data encryption (Computer science)
dc.subject Bachelor's theses
dc.title Monitorización, detección y bloqueo de procesos de cifrado malicioso
dc.type info:eu-repo/semantics/bachelorThesis


Ficheros en el ítem

Ficheros Tamaño Formato Ver

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Buscar en DSpace


Búsqueda avanzada

Listar

Mi cuenta