IET Information Security (Jan 2022)

Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker

  • José Antonio Gómez‐Hernández,
  • Raúl Sánchez‐Fernández,
  • Pedro García‐Teodoro

DOI
https://doi.org/10.1049/ise2.12042
Journal volume & issue
Vol. 16, no. 1
pp. 64 – 74

Abstract

Read online

Abstract After several years, crypto‐ransomware attacks still constitute a principal threat for individuals and organisations worldwide. Despite the fact that a number of solutions are deployed to fight against this plague, one main challenge is that of early reaction, as merely detecting its occurrence can be useless to avoid the pernicious effects of the malware. With this aim, the authors introduced in a previous work a novel anti‐ransomware tool for Unix platforms named R‐Locker. The proposal is supported on a honeyfile‐based approach, where ‘infinite’ trap files are disseminated around the target filesystem for early detection and to effectively block the ransomware action. The authors extend here the tool with three main new contributions. First, R‐Locker is migrated to Windows platforms, where specific differences exist regarding FIFO handling. Second, the global management of the honeyfiles around the target filesystem is now improved to maximise protection. Finally, blocking suspicious ransomware is (semi)automated through the dynamic use of white‐/black‐lists. As in the original work for Unix systems, the new Windows version of R‐Locker shows high effectivity and efficiency in thwarting ransomware action.

Keywords