Show simple item record  

dc.contributor.advisorKumar, Vimal
dc.contributor.advisorMalik, Robi
dc.contributor.advisorPatros, Panos
dc.contributor.authorChew, Christopher J.W.
dc.date.accessioned2023-08-06T22:34:03Z
dc.date.available2023-08-06T22:34:03Z
dc.date.issued2023
dc.identifier.urihttps://hdl.handle.net/10289/15958
dc.description.abstractThe malware landscape is ever-changing, with threat actors utilising more sophisticated techniques to compromise data. As the usage of smartphones increases, more threat actors will turn their attention to capitalise on the popularity. This thesis addresses this ongoing issue and focuses on encryption-type ransomware, which has been a rising malware threat in recent years, on the Android operating system. Many state-of-the-art anti-malware solutions have shifted away from static signature-based approaches as the techniques utilised by threat actors have become more advanced. Most newer solutions look towards the use of dynamic analysis to automatically identify malware. However, the large quantities of information required by dynamic analysis approaches often present a challenging task for developing robust automated anti-malware solutions and may be easily circumvented by future threat actors, which implies that more specialised automated solutions are required. In the work presented in this thesis, we observe encryption-type ransomware behavioural patterns at a system call-level. We describe the Android Applications dataset on which a large portion of this work is based. By utilising the created dataset and the behavioural patterns, this thesis presents solutions using Finite State Machines (FSM) and supervisor reduction to quickly detect Android encryption-type ransomware. Furthermore, the solutions are evaluated on Linux encryption-type ransomware to show its transferability and generalisability. We measured the success of our techniques by using the following accuracy metrics: true positive rates, false negative rates, true negative rates, false positive rates, and achieved an F1-score of up to 93.8%.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherThe University of Waikato
dc.rightsAll items in Research Commons are provided for private study and research purposes and are protected by copyright with all rights reserved unless otherwise indicated.
dc.subjectRansomware
dc.subjectSystem calls
dc.subjectBehavioural patterns
dc.subjectMalware detection
dc.subjectFinite-state automaton
dc.subjectAndroid
dc.subject.lcshComputer security
dc.subject.lcshMalware (Computer software)
dc.subject.lcshCyberspace -- Security measures
dc.subject.lcshInternet of things -- Security measures
dc.subject.lcshSmartphones -- Security measures
dc.subject.lcshData encryption (Computer science) -- Security measures
dc.subject.lcshSequential machine theory
dc.subject.lcshComputer networks -- Security measures
dc.subject.lcshComputers -- Access control
dc.subject.lcshG1 (Smartphone) -- Security measures
dc.subject.lcshMobile communication systems -- Security measures
dc.subject.lcshMobile computing -- Security measures
dc.subject.lcshComputer crimes -- Prevention
dc.titleBehaviour-based classification of encryption-type ransomware using system calls
dc.typeThesis
thesis.degree.grantorThe University of Waikato
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy (PhD)
dc.date.updated2023-07-20T04:50:35Z
pubs.place-of-publicationHamilton, New Zealanden_NZ


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record