Ransomware prevention method and system

A software and software encryption technology, applied in the field of information security, can solve the problems of undetectable, occupation, and no effective solution to prevent ransomware, etc., and achieve the effect of high warning accuracy

Active Publication Date: 2016-11-09
倪茂志
View PDF2 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, there are mainly two kinds of prevention schemes for ransomware: the first scheme is to find known ransomware by means of antivirus engine scanning features; antivirus engine is the main part of antivirus software, to detect and find programs, and the virus database is a sample of the virus that has been found. Use the samples in the virus database to compare all the programs or files in the machine to see if they match these samples. If it is, it is a virus, otherwise it is not necessarily a virus (because There are still many viruses that have not been discovered or just produced), but because the virus database of the antivirus engine is known and the collected samples are generated by extracting features, it is impossible to prevent unknown samples that have not been collected, based on The scheme of this principle also cannot detect unknown ransomware; and because the virus database is obtained based on the binary data extraction characteristics of samples, and the antivirus engine judges whether an unknown file is a virus (ransomware) based on the matching degree of this characteristic. software), therefore, even for known samples, as long as the binary data judged by the antivirus engine is changed, the antivirus engine will not be able to detect it, so the first solution cannot be detected even for known viruses and ransomware Disadvantages (as long as the signature is changed)
The second solution is to use file backup to prevent ransomware. The main principle is to back up files that have been modified and deleted on readable and writable disks within a certain period of time, so that when the files on the disk are blackmailed within this period of time, If the software is encrypted, the encrypted file can be retrieved by backing up the file, but the disadvantage of the second solution is that it takes up a lot of disk space
[0004] Therefore, there is currently no effective solution to prevent ransomware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ransomware prevention method and system
  • Ransomware prevention method and system
  • Ransomware prevention method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0040] All ransomware (known or unknown) will go through all the files on the disk, find the files that match the encryption type, and encrypt them. (So ​​far, no ransomware has been found without such steps). Therefore, based on this, a ransomware prevention method and system of the present invention are designed.

[0041] figure 1 It is a flow chart of the method for preventing ransomware described in the present invention.

[0042] Such as figure 1 As shown, a method for preventing ransomware includes the following steps:

[0043] Step S1, constructing at least one decoy file conforming to the encryption type of ransomware, and inserting it into the original file sequence of the disk to be protected;

[0044...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a ransomware prevention method and system. The method comprises the steps of creating at least one bait file with the type conforming to a ransomware encryption type and inserting the bait file into an original file sequence of a to-be-protected disk; judging whether the bait file is changed or not; and prohibiting the to-be-protected disk to be subjected to a preset operation when the bait file is changed. According to the method and the system, the bait file with the type conforming to the ransomware encryption type is created by utilizing a characteristic that ransomware traverses disk files necessarily to search for a file type suitable for encryption, and the bait file is put in the original file sequence of the to-be-protected disk; the effects of prewarning the ransomware and protecting other disk files are achieved by monitoring the bait file; the prewarning accuracy is high; a targeted scheme is designed based on an inevitable common behavior of the ransomware, so that known and unknown ransomware can be detected; and the disk space occupied by the created bait file nearly can be ignored.

Description

technical field [0001] The invention relates to the field of information security, in particular to a ransomware prevention method and system. Background technique [0002] Ransomware is a type of malicious software used by hackers to hijack user assets or resources and extort money from users on the condition of this. Ransomware usually encrypts documents, emails, databases, source codes, pictures, compressed files and other files on the user's system in some form to make them unusable, or interferes with the normal use of users by modifying system configuration files. The systematic method reduces the availability of the system, and then sends a blackmail notice to the user through pop-up windows, dialog boxes, or text files, requiring the user to transfer money to the designated account to obtain the password for decrypting the file or obtain the method to restore the normal operation of the system. [0003] In the prior art, there are mainly two kinds of prevention sche...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/552G06F21/566
Inventor 倪茂志
Owner 倪茂志
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products