Ransomware is an emerging threat which imposed a \$ 5 billion loss in 2017 and is predicted to hit \$ 11.5 billion in 2019. While initially targeting PC (client) platforms, ransomware recently made the leap to server-side databases - starting in January 2017 with the MongoDB Apocalypse attack, followed by other attack waves targeting a wide range of DB types such as MongoDB, MySQL, ElasticSearch, Cassandra, Hadoop, and CouchDB. While previous research has developed countermeasures against client-side ransomware (e.g., CryptoDrop and ShieldFS), the problem of server-side ransomware has received zero attention so far. In our work, we aim to bridge this gap and present DIMAQS (Dynamic Identification of Malicious Query Sequences), a novel anti-ransomware solution for databases. DIMAQS performs runtime monitoring of incoming queries and pattern matching using Colored Petri Nets (CPNs) for attack detection. Our system design exhibits several novel techniques to enable efficient detection of malicious query sequences globally (i.e., without limiting detection to distinct user connections). Our proof-of-concept implementation targets MySQL servers. The evaluation shows high efficiency with no false positives and no false negatives and very moderate performance overhead of under 5%. We will publish our data sets and implementation allowing the community to reproduce our tests and compare to our results.
翻译:Ransomware是一个新出现的威胁,2017年造成50亿美元的损失,预计2019年将达到115亿美元。尽管最初针对PC(客户)平台的赎金软件最近跳跃到服务器数据库,从2017年1月开始,MongoDB Apocalypses袭击,随后是针对多种DB类型的其他袭击波,如MongoDB、MySQL、ElasticSearch、Cassandra、Hadoop和CouchDBB。虽然以前的研究已经针对客户方赎金软件(例如CryptoDrop和SHeldFS)制定了对策,但服务器-SladFS的问题迄今没有得到任何关注。我们的工作目标是弥合这一差距,并推出DIMAQS(恶意QuerkeyQuergeeses),一个针对数据库的新型的反兰索软件解决方案。DIMAQS对收到的虚假查询和模式进行实时监测,以便利用Cloed Petri Nets(CPNs)进行攻击检测。我们设计的系统设计了若干新技术技术,以方便地显示我们的服务器连接。Servialalalalalalalalal 。根据我们的数据测试显示全球的运行运行效率。我们的数据测试结果,将在全球进行。