SSD-Assisted Ransomware Detection and Data Recovery Techniques

Sungha Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, Dae Hun Nyang

Research output: Contribution to journalArticlepeer-review

27 Scopus citations

Abstract

As ransomware attacks have been prevalent, it becomes crucial to make anti-ransomware solutions that defend against ransomwares. In this article, we propose a new ransomware defense system, called SSD-Insider++, which prevents users' files from being damaged by ransomware attacks. SSD-Insider++ is embedded into an SSD controller as a form of firmware. By being separated from a host machine, it not only provides more robust data protection than software-based ones which are vulnerable to evasion attacks, but also offers interoperability with various platforms. SSD-Insider++ is composed of two novel features, ransomware detection and perfect data recovery, which are tightly integrated with each other. The detection algorithm observes I/O patterns of a host system and decides whether the host is being attacked by ransomwares in an early stage. Once an encryption attack is detected, the recovery algorithm is triggered to recover original files by leveraging a delayed deletion feature of an SSD at a low cost. Our experimental results show that SSD-Insider++ achieves high accuracy of detecting ransomwares with 0 percent FRR/FAR in most cases and provides an instant data recovery with 0 percent data loss. The overhead of running SSD-Insider++ is negligible - only 80 nns and 226 nns are spent more for handling 4-KB reads and writes, respectively.

Original languageEnglish
Article number9146350
Pages (from-to)1762-1776
Number of pages15
JournalIEEE Transactions on Computers
Volume70
Issue number10
DOIs
StatePublished - 1 Oct 2021

Bibliographical note

Publisher Copyright:
© 1968-2012 IEEE.

Keywords

  • Ransomware
  • data recovery
  • flash-based SSDs
  • malware detection

Fingerprint

Dive into the research topics of 'SSD-Assisted Ransomware Detection and Data Recovery Techniques'. Together they form a unique fingerprint.

Cite this