KEY-SSD: Access-Control Drive to Protect Files from Ransomware Attacks

04/10/2019
by   Jinwoo Ahn, et al.
0

Traditional techniques to prevent damage from ransomware attacks are to detect and block attacks by monitoring the known behaviors such as frequent name changes, recurring access to cryptographic libraries and exchange keys with remote servers. Unfortunately, intelligent ransomware can easily bypass these techniques. Another prevention technique is to recover from the backup copy when a file is infected with ransomware. However, the data backup technique requires extra storage space and can be removed with ransomware. In this paper, we propose to implement an access control mechanism on a disk drive, called a KEY-SSD disk drive. KEY-SSD is the data store and the last barrier to data protection. Unauthorized applications will not be able to read file data even if they bypass the file system defense, thus denying the block request without knowing the disk's registered block key and completely eliminating the possibility of the file becoming hostage to ransomware. We have prototyped KEY-SSD and validated the usefulness of KEY-SSD by demonstrating 1) selective block access control, 2) unauthorized data access blocking and 3) negligible performance overhead. Our comprehensive evaluation of KEY-SSD for various workloads show the KEY-SSD performance is hardly degraded due to OS lightweight key transmission and access control drive optimization. We also confirmed that KEY-SSD successfully protects the files in the actual ransomware sample.

READ FULL TEXT
research
04/18/2021

FOX: Hardware-Assisted File Auditing for Direct Access NVM-Hosted Filesystems

With emerging non-volatile memories entering the mainstream market, seve...
research
10/26/2021

BuffetFS: Serve Yourself Permission Checks without Remote Procedure Calls

The remote procedure call (a.k.a. RPC) latency becomes increasingly sign...
research
04/19/2020

ferify: A Virtual Machine File Protection System against Zero-Day Attacks

Most existing solutions for protecting VMs assume known attack patterns ...
research
01/08/2019

Service Rate Region of Content Access from Erasure Coded Storage

We consider storage systems in which K files are stored over N nodes. A ...
research
06/07/2023

Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)

Key-value stores typically leave access control to the systems for which...
research
06/27/2023

MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation

Ransomware has remained one of the most notorious threats in the cyberse...
research
03/22/2019

Understanding and taming SSD read performance variability: HDFS case study

In this paper we analyze the influence that lower layers (file system, O...

Please sign up or login with your details

Forgot password? Click here to reset