Best Papers
 A Study on Micro-Segmentation Based File-Encrypting Ransomware Detection 


Vol. 48,  No. 9, pp. 1114-1122, Sep.  2023
10.7840/kics.2023.48.9.1114


PDF Full-Text
  Abstract

Traditional perimeter-focused security measures have limitations in a complex and diversifying IT infrastructure environment. Traditional perimeter firewalls cannot effectively detect attackers who have crossed the perimeter and entered the trust zone. While organizations take proactive steps to reduce the scope of attacks, it is difficult to stop data leaks. Therefore, organizations need to enhance their ability to detect and prevent lateral movement The proposed methodology is based on micro-segmentation to separate directories and files into regions, organize directories and files into blocks, and then detect anomalies. The experiment utilized real data from a virtualized environment and measured the time to detect file-encrypted ransomware by executing the malware.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Related Articles
  Cite this article

[IEEE Style]

J. Seo, "A Study on Micro-Segmentation Based File-Encrypting Ransomware Detection," The Journal of Korean Institute of Communications and Information Sciences, vol. 48, no. 9, pp. 1114-1122, 2023. DOI: 10.7840/kics.2023.48.9.1114.

[ACM Style]

Jung-woo Seo. 2023. A Study on Micro-Segmentation Based File-Encrypting Ransomware Detection. The Journal of Korean Institute of Communications and Information Sciences, 48, 9, (2023), 1114-1122. DOI: 10.7840/kics.2023.48.9.1114.

[KICS Style]

Jung-woo Seo, "A Study on Micro-Segmentation Based File-Encrypting Ransomware Detection," The Journal of Korean Institute of Communications and Information Sciences, vol. 48, no. 9, pp. 1114-1122, 9. 2023. (https://doi.org/10.7840/kics.2023.48.9.1114)
Vol. 48, No. 9 Index