DOI QR코드

DOI QR Code

Modeling of Ransomware using Colored Petri Net

칼라 페트리 네트를 이용한 랜섬웨어의 모델링

  • Lee, Yo-Seob (School of ICT Convergence Smart Contents Major, Pyeongtaek University)
  • 이요섭 (평택대학교 ICT 융합학부 스마트컨텐츠전공)
  • Received : 2018.02.12
  • Accepted : 2018.04.15
  • Published : 2018.04.30

Abstract

The advent of cryptography has become a means of obtaining real monetary benefits to hackers, which has recently led to a surge in the number of Ransomware and the associated damage has increased significantly. It is expected that malicious codes will be expanded to new areas by meeting passwords, and Ransomware will be further increased in the future. To solve these problems, we need a model that can detect and block intrusion of Ransomware by analyzing the intrusion path of Ransomware. In this paper, we collect and analyze the data of Ransomware, and create and analyze Ransomware's color Petri net model.

암호화폐의 등장은 해커에게 실제 금전적 이득을 취득할 수 있는 수단이 되었고, 이에 따라 최근 랜섬웨어가 급증하며 관련 피해가 크게 늘어나고 있다. 악성코드가 암호화폐를 만나 새로운 영역으로 확장되고 있으며, 앞으로 랜섬웨어가 더욱 증가할 것으로 예측된다. 이러한 문제들을 해결하기 위해 랜섬웨어의 침입 경로를 분석하여 랜섬웨어의 침입을 탐지하고 차단할 수 있는 모델이 필요하다. 본 논문에서는 최근 랜섬웨어들의 자료를 수집하여, 이를 토대로 랜섬웨어의 칼라 페트리 네트 모델을 작성하고, 분석하고자 한다.

Keywords

References

  1. Y. Lee, "Design and Analysis of Multiple Intrusion Detection Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 619-626. https://doi.org/10.13067/JKIECS.2016.11.6.619
  2. Y. Chun, "Hacking Detection Mechanism of Cyber Attacks Modeling," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 9, 2013, pp. 1313-1318. https://doi.org/10.13067/JKIECS.2013.8.9.1313
  3. S. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014, pp. 261-266. https://doi.org/10.13067/JKIECS.2014.9.2.261
  4. W. Li, R. Wu, and H. Huang, "Colored Petri Nets Based Modeling of Information Flow Security," 2009 Second International Workshop on Knowledge Discovery and Data Mining, Moscow, Russia, 23-25 Jan. 2009.
  5. B. Jasiul, M. Szpyrka, and J. Sliwa, "Malware Behavior Modeling with Colored Petri Nets," Computer Information Systems and Industrial Management Volume 8838 of the Series Lecture Notes in Computer Science, 5-7 Nov. 2014, pp 667-679.
  6. B. Jasiul, M. Szpyrka, and J. Sliwa, "Formal Specification of Malware Models in the Form of Colored Petri Nets," Computer Science and its Applications Volume 330 of the series Lecture Notes in Electrical Engineering, 2015, pp 475-482.
  7. K. Jensen and L. Kristensen, "Colored Petri Nets - Modeling and Validation of Concurrent Systems. Berlin: Springer-Verlag, 2009.
  8. Y. Lee and P. Moon, "A Comparison and Analysis of Deep Learning Framework," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, 2017, pp. 115-122. https://doi.org/10.13067/JKIECS.2017.12.1.115