Dynamic Distributed Secure Storage Against Ransomware

In just a few years, ransomware evolved into one of the most pernicious threats on the web. From hijacking private disks, the cybercriminals moved to disabling hospital networks, while the cyberwarriors launched destructive cyberwar exercises masquerading as ransomware. To match the variety of attacks, there is also a variety of promising proposals for the mitigation of the ransomware problem by disrupting the attack cycle at various points. None of them seems to be eliminating the vulnerability of static nodes in dynamic networks. We put forward the idea that ransomware is a symptom of a broader problem of architectural imbalance in social computation, while the processes are dynamic and nonlocal, the storage is static and local. We study and discuss some paths toward dynamic, nonlocal, and secure storage. Furthermore, we provide a toy method for locally encrypting the data that can provide a balance of high security and encryption speed.

[1]  Leyla Bilge,et al.  Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.

[2]  Baochun Li,et al.  Erasure coding for cloud storage systems: A survey , 2013 .

[3]  P. Matthews,et al.  Generating uniformly distributed random latin squares , 1996 .

[4]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[5]  Donald E. Knuth,et al.  Dancing links , 2000, cs/0011047.

[6]  Gianluca Stringhini,et al.  PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.

[7]  J. Plank Erasure Codes for Storage Systems , 2013 .

[8]  Pan Zhou,et al.  Toward Optimal Storage Scaling via Network Coding: From Theory to Practice , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[9]  Roberto Fontana Random Latin squares and Sudoku designs generation , 2013 .

[10]  Damon McCoy,et al.  Tracking Ransomware End-to-end , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[11]  Moti Yung,et al.  Cryptovirology , 2017, Commun. ACM.

[12]  Bo Chen,et al.  RDS3: Ransomware defense strategy by using stealthily spare space , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).

[13]  Dimitris S. Papailiopoulos,et al.  XORing Elephants: Novel Erasure Codes for Big Data , 2013, Proc. VLDB Endow..

[14]  Wojciech Mazurczyk,et al.  Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall , 2016, IEEE Network.

[15]  George Dyson,et al.  Darwin among the machines , 1998, The Mathematical Gazette.

[16]  Moti Yung,et al.  Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[17]  Paul Baran,et al.  On Distributed Communications , 1964 .