Skip to main content

Showing 1–8 of 8 results for author: Macfarlane, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.18852  [pdf, other

    cs.CR

    Majority Voting Approach to Ransomware Detection

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 17 pages

  2. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

    Authors: Simon R Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many crypto-ransomware detection techniques is to monitor file system activity and attempt to identify encrypted files being written to disk, often using a… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Journal ref: Entropy. 2022; 24(10):1503

  3. NapierOne: A modern mixed file data set alternative to Govdocs1

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient description of its actual content, to allow it to be recreated by other researchers interested in reconstructing their environment and validating the research results. A modern cybersecurity mixed file data set called NapierOne… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Journal ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817

  4. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attack. In the majority of cases, once a victim has been attacked there remain only two courses of action open to them; either pay the ransom or lose their data. One common behaviour shared between all crypto ransomware strains is… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Journal ref: Computers & Security, 102377, 2021

  5. Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

    Authors: Simon R. Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Memory was captured from a system infected by ransomware and its contents was examined using live forensic tools, with the intent of identifying the symmetric encryption keys being used. NotPetya, Bad Rabbit and Phobos hybrid ransomware samples were tested during the investigation. If keys were discovered, the following two steps were also performed. Firstly, a timeline was manually created by com… ▽ More

    Submitted 19 December, 2020; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: 11 pages, 10 figures

    ACM Class: E.3; K.6.5

    Journal ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979

  6. Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques -- An Experiment

    Authors: Joel Chacon, Sean McKeown, Richard Macfarlane

    Abstract: Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature- and anomaly-based intrusion detection approaches. Deception techniques such as decoy objects, often called honey items, may be deployed for intrusion detection and attack analysis, providing an alternative to detect APT behaviours. This work explores the use of honey items to classi… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

  7. Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

    Authors: Ian Lowe, William J Buchanan, Richard J Macfarlane, Owen Lo

    Abstract: Bluetooth is a short-range wireless technology that provides audio and data links between personal smartphones and playback devices, such as speakers, headsets and car entertainment systems. Since its introduction in 2001, security researchers have suggested that the protocol is weak, and prone to a variety of attacks against its authentication, link management and encryption schemes. Key research… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Journal ref: Journal of Network Technology, 2019

  8. arXiv:1907.10387  [pdf, other

    cs.CR

    Privacy Parameter Variation Using RAPPOR on a Malware Dataset

    Authors: Peter Aaby, Juanjo Mata De Acuna, Richard Macfarlane, William J Buchanan

    Abstract: Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy-Preserving Ordinal Response) method adds parameterised noise, which must be carefully selected to maintain adequate privacy without losing analytical… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Journal ref: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)