Deep Learning for protection from Ransomware attacks

Deep Learning for protection from Ransomware attacks

  1. Introduction

Nowadays Ransomware attacks are on the rise. Many companies have become victim to ransomware attacks. While there are different types of ransomware, it typically involves the attacker breaching company’s network, encrypting a large amount of the company’s files/data, which usually contain sensitive information, exfiltrating the encrypted files, and demanding a ransom. Therefore, a sudden spurt of encrypted data movement in the corporate network traffic can be a strong indication of ransomware infection. To effectively detect such behavior patterns, there needs to be capability to detect encrypted files using machine learning (ML) and generate encrypted data movement alerts as part of user behavior analytics. This will help companies to identify ransomware attacks as they unfold in their network.

2. Leveraging Analytics to detect signs of files corruption

Data backups are leveraged to observe how data changes over time and post that we can use analytics to detect signs of files corruption indicative of ransomware attacks. Based on content analytics which look for signs of corruption based in metadata, automated alerts can become active whenever suspicious behavior is detected. Some examples that can be considered as signs of corruptions could be mass deletions, encryption , other suspicious changes to core infrastructure, user files etc. In addition to signs of corruption, we need to recognize activity patterns and learn/train constantly. In the event of ransomware attacks,?post-attack analytics reports can be utilized to understand the depth and breadth of attacks which provide a listing of last good backup sets before corruption, to facilitate recovery process.

3.??????Machine Learning for diagnosis of cyber attacks

Traditional signature-based detection, anomaly based detection, immutability of data are not adequate to identify ransomware attacks, next technique being looked at is behavior based detection. An AI/ML driven solution can analyze large data sets with a high degree of accuracy to identify the most subtle Indicators of Behavior (IoBs) at a scale that manual human analysis can never match. The goal of behavior analytics is to detect anomalous user behavior that indicates potential threats such as malicious insiders, compromised accounts, data exfiltration, ransomware, and other threats, through machine learning and statistical analysis.?ML algorithms would be constantly monitoring for malicious activity, detecting actively never-before seen ransomware strains, immediate blocking of questionable behavior and automatic recovery of damaged files and continuously learn from them and train our ML algorithms.

Stack trace analysis is also one of the foundation techniques which will look from track record of what happens at different points in time. By analyzing what happens at each stage, normal activity becomes clear and a reference model is created. In the case of a ransomware attack, new code would be injected into this process – which is readily noticeable. The strongest software solutions use ML that considers only the most popular reference points and excludes aberrations. This approach further refines the machine’s knowledge of good versus malicious code increasing accuracy.

The sequence of bytes in an encrypted file tends to be more random than unencrypted files, which is often manifested in some statistical measures of randomness and information density in the file. Therefore, these statistical tests can be helpful in determining whether a file is encrypted or not. We can explore various statistical tests such as Chi-square Test, Entropy, Arithmetic Mean, Monte Carlo Value for Pi etc. However, our analysis shows that using any of these statistical tests alone is not sufficient to identify encrypted files and can generate excessive false positives. For example, some compressed files also look random according to some of these tests. To reduce the false positives from individual statistical tests, we need to develop some classification ML models to classify whether a file is encrypted or not. The model takes all of the statistical tests and other characteristics of the file as input features, based on millions of real and synthetic files of different file types. A decision tree-like ML model/algorithm can automatically learn the difference between encrypted files and unencrypted files. In our tests, the ML model was able to achieve good accuracy with low false positives. critical to automating correlations by analyzing data at a rate of millions of events per second, so instead of manually querying data, analysts can spend more time acting on the insights produced by AI/ML across disparate assets on the network.

?4.??????Way Forward

?Preventing ransomware attacks on the endpoint, across the enterprise, to everywhere the battle is taking place. This would require hybrid (Static, Dynamic) and multi-level approach ( Feature, Behavior, Stack trace, Encryption etc.) to detect ransomware attacks reasonably accurately. A periodic evaluation of chain ingredients to incorporate the new variants will make our capability more robust and automating this task will be very helpful. Leveraging cloud computing with parallel processing capabilities will further enhance adoption. Isolation of data, files or databases from production environments will make the environment resistant to ransomware attacks. But not all attacks target just data. Key IT infrastructure code are also vulnerable. There have been reports of attacks on operating systems, firmware, network/ communication switches, and applications as well.?Cybercriminals can now leverage?ransomware-as-a-service?kits, allowing inexperienced cybercriminals to deploy complex, undetectable attacks with ease – exponentially increasing the threat at hand. Hence it becomes all the more important to enable ransomware attacks prevention automated through machine learning so that analysts can spend more time on validating insights provided by AI/ML and act quickly to protect their environments rather than doing manual correlations of data.

About the Author

Raghuveeran Sowmyanarayanan is Artificial Intelligence & Analytics Leader heading Delivery Transformation Office at Cognizant and was heading AI&A Healthcare practice earlier and has been personally leading very large & complex Enterprise Data Lake & AI/ML implementations. He can be reached at?[email protected]

Rama Ramanathan

Executive Client Partner at Randstad Digital US

1 年

Excellent one Raghu ??

回复
Chengeesh Mayan

Data Architect at Cognizant Technology Solutions

1 年

Every subject you publish is futuristic, interesting and unique. Thanks Raghu!

要查看或添加评论,请登录

Raghuveeran Sowmyanarayanan的更多文章

  • OpenAI's O1 that can Reason & Learn

    OpenAI's O1 that can Reason & Learn

    OpenAI recently introduced its o1-preview & o1-mini LLMs. o1 represents a significant advancement in generative AI…

  • Leveraging quantum computing for Healthcare

    Leveraging quantum computing for Healthcare

    What is Quantum Computing? Imagine you have a super powerful computer that can solve really hard problems much faster…

    3 条评论
  • Leveraging AI/Gen AI for evaluating Providers performance

    Leveraging AI/Gen AI for evaluating Providers performance

    In today's rapidly evolving healthcare landscape, the integration of Artificial Intelligence (AI) and Generative AI…

    2 条评论
  • Art of Prompt Engineering – Unleashing complete potential of LLMs

    Art of Prompt Engineering – Unleashing complete potential of LLMs

    AI has been a remarkable revolution over decades and Gen AI is an unimaginable innovation over last 10 months. Its…

    1 条评论
  • Business Case for Gen AI Initiatives

    Business Case for Gen AI Initiatives

    Introduction AI has been there for years…What is really new in Gen AI? Its out-of-the-box accessibility makes…

    3 条评论
  • AI Attacks

    AI Attacks

    What is an AI Attack? AI hackers / adversaries can manipulate AI systems in order to change their behaviour for a…

    2 条评论
  • Leveraging AI/ML for Bionic Implants

    Leveraging AI/ML for Bionic Implants

    Advances in technology have greatly benefited the field of prosthetics in the last few years. Today’s prosthetic limbs…

    5 条评论
  • Digital Pharmacist using Deep Learning

    Digital Pharmacist using Deep Learning

    Pharmacy automation systems reduce the time taken by pharmacists to fill prescriptions. It brings in vast experience of…

    5 条评论
  • Leveraging Reinforcement learning for diagnosis

    Leveraging Reinforcement learning for diagnosis

    Computer-aided diagnosis is a useful tool for radiologists, as it provides image metrics that facilitate quicker and…

    3 条评论
  • Realising Value of Big Data in Healthcare

    Realising Value of Big Data in Healthcare

    Big Data continues to change the way we think about everything and here we look at how healthcare is reaping benefits…

    2 条评论

社区洞察

其他会员也浏览了