0% found this document useful (0 votes)
7 views4 pages

Amoeba

The document presents Amoeba, an autonomous backup and recovery SSD designed to combat ransomware attacks by efficiently managing backup data and minimizing overhead. Unlike existing systems, Amoeba utilizes a hardware accelerator for rapid ransomware detection and a fine-grained backup control mechanism to optimize space usage. Evaluation results indicate that Amoeba outperforms current solutions in both performance and space efficiency while effectively mitigating ransomware risks.

Uploaded by

Sumit Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Amoeba

The document presents Amoeba, an autonomous backup and recovery SSD designed to combat ransomware attacks by efficiently managing backup data and minimizing overhead. Unlike existing systems, Amoeba utilizes a hardware accelerator for rapid ransomware detection and a fine-grained backup control mechanism to optimize space usage. Evaluation results indicate that Amoeba outperforms current solutions in both performance and space efficiency while effectively mitigating ransomware risks.

Uploaded by

Sumit Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 17, NO.

2, JULY-DECEMBER 2018 243

Amoeba: An Autonomous Backup each system has limitations in efficiency in detecting ransomware
and Recovery SSD for Ransomware attacks and managing backup data.
For example, the limitations of FlashGuard [9] are manifolded:
Attack Defense (1) it generates many backup pages, which results in performance
degradation, because it triggers frequent garbage collection; (2) it
Donghyun Min , Donggyu Park, Jinwoo Ahn, requires frequent communication between the host and the SSD,
Ryan Walker, Junghee Lee , Sungyong Park , because the host makes the final decision of the ransomware attack;
and Youngjae Kim (3) manual investigation is required for recovery; and (4) it does
not have a method to control the backup space. SSD-Insider [10]
Abstract—Ransomware is one of growing concerns in enterprise and government
organizations, because it may cause financial damages or loss of important data. adopts a method to detect ransomware attack pattern only by over-
Although there are techniques to detect and prevent ransomware, an evolved write pattern in particular. However, this system has the problem
ransomware may evade them because they are based on monitoring known that it can not distinguish between normal overwrite and ransom-
behaviors. Ransomware can be mitigated if backup copies of data are retained in a ware overwrite attack.
safe place. However, existing backup solutions may be under ransomware’s In this paper, we propose Amoeba, an autonomous backup and
control and an intelligent ransomware may destroy backup copies too. They also recovery SSD, to solve these problems. Amoeba automatically per-
incur overhead to storage space, performance and network traffic (in case of
forms the infection detection of the ransomware, alerts, backup data
remote backup). In this paper, we propose an SSD system that supports
automated backup, called Amoeba. In particular, Amoeba is armed with a
management and recovery inside the SSD. Unlike FlashGuard [9]
hardware accelerator that can detect the infection of pages by ransomware attacks and SSD-Insider [10], Amoeba implements data content-based
at high speed and a fine-grained backup control mechanism to minimize space inspection for high-accuracy ransomware detection. Specifically,
overhead for original data backup. For evaluation, we extended the Microsoft SSD first, the ransomware detection is accelerated and the communica-
simulator to implement Amoeba and evaluated it using the realistic block-level tion with the host is minimized by designing a hardware accelerator
traces, which are collected while running the actual ransomware. According to our to calculate the Ransomware Attack Risk Indicator (RARI) for the
experiments, Amoeba has negligible overhead and outperforms in performance
write request in the SSD. Second, Amoeba supports the fine-grained
and space efficiency over the state-of-the-art SSD, FlashGuard, which supports
management of the backup page by determining the backup page,
data backup within the device.
according to the probability of ransomware infection for each page.
Consequently, Amoeba manages only one backup page of each
Index Terms—Solid-state drive (SSD), storage security, ransomware attack
page, minimizing GC overhead as well as backup space.
Ç
2 RANSOMWARE ATTACKS AND DEFENSE
2.1 Internal Operations for SSDs
1 INTRODUCTION SSDs can read and write page by page, and erase block by block. In
NAND flash, however, the erase operation unit is a block that is
RANSOMWARE is a type of malware that takes user data files as hostage
composed of several pages. A whole block should be erased during
by encrypting them until the victim pays a ransom. In July and June
in-place update, which causes considerable overhead. So, SSDs
2017, massive ransomware attacks occurred and more than 12,000
perform an out-of-place update that writes data to a new empty
computers were attacked [1]. Since ransomware may cause immediate
page and invalidates an existing page to minimize the overhead of
financial damages, it is in urgent need to find an effective way to miti-
the erase. Invalid pages are collected after the erase during Gar-
gate ransomware. For example, Atlanta had to spend more than
bage Collection. To perform the out-of-place update, the SSD man-
$2.6M to recover from the recent ransomware attack in 2018 [2].
ages each page which has states of free, valid, and invalid. free is a
Existing techniques detect and prevent ransomware by identify-
blank page that can be written. When data is written to a page, its
ing known behaviors of ransomware such as frequent access of
state changes to the valid state. If data is overwritten on the same
cryptographic libraries and receiving encryptions keys from a
logical page afterward, the mapped physical page changes to the
remote server [3], [4], [5], [6], [7]. However, these techniques can be
invalid state and the data is written to a new free page, which is to
evaded [3]. The guaranteed solution to ransomware is data backup.
be mapped with the logical page address. A page in invalid state
A filesystem may retain backup copies and recover them if they are
cannot be used until it is erased by the GC.
infected by ransomware [8].
NAND flash memory based solid-state drives (SSDs) are a good
2.2 Data Backup Inside an SSD
candidate to implement a data backup mechanism. It always
Ransomware is a malware that encrypts and takes the user data
retains a previous version of data because of its out-of-place update
files as hostage until the victim pays a ransom. Ransomware reads
until an internal Garbage Collection (GC) process sweeps stale
and encrypts the user data, and then overwrites it. Therefore, pages
data. If an SSD backs up files internally, it is transparent to users,
that are infected with ransomware show a typical IO performance
and backup copies cannot be destroyed by ransomware and privi-
pattern of Read After Write. The solution to cope with ransom-
leged system software.
ware is to back up the original data in advance and restore it when
FlashGuard [9] and SSD-Insider [10] are systems that manage
infected. However, existing methods, which backup and restore
backup data inside the SSD for ransomware attack protection, but
data by a file system, requires additional space cost for backup and
IO performance overhead to calculate the ransomware infection,
 D. Min, D. Park, J. Ahn, S. Park, and Y. Kim are with Sogang University, Seoul 04107, and implies the risk of the damage to the backup data copy, due to
South Korea. E-mail: {mdh38112, dgpark, jinu37, parksy, youkim}@sogang.ac.kr.
 R. Walker and J. Lee are with the University of Texas at San Antonio, San Antonio, the intelligent ransomware attacks. To solve this problem, Flash-
TX 78249. E-mail: {ryan.walker, junghee.lee}@utsa.edu. Guard [9] proposes a mechanism to perform data backup in the
Manuscript received 1 July 2018; revised 13 Sept. 2018; accepted 5 Oct. 2018. Date of SSD rather than the OS. If any disk page shows a pattern of
publication 27 Nov. 2018; date of current version 10 Dec. 2018. Read After Write, it saves the backup of that page in the device
(Corresponding author: Youngjae Kim.) space to solve the overhead issues of the existing file system.
For information on obtaining reprints of this article, please send e-mail to: reprints@ieee.
org, and reference the Digital Object Identifier below. FlashGuard adds a backup state (backup) between valid and
Digital Object Identifier no. 10.1109/LCA.2018.2883431 invalid states considering the feature of an SSD device in which the
1556-6056 ß 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See ht_tp://www.ieee.org/publications_standards/publications/rights/index.html for more information.
244 IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 17, NO. 2, JULY-DECEMBER 2018

Fig. 1. A description of the OOB metadata area to support the backup mechanism.
LPN: logical page number, PPN: physical page number, BPN: backup page
number.
Fig. 2. Non-deterministic Finite Automata (NFA) for Amoeba.

valid state page is not deleted immediately but, is kept in the from the flash memory, and compute their similarity. At the same
invalid state for a certain period of time. If Read After Write pat- time, the number of occurrences counts up according to the new
tern, which is suspected to be an access pattern of ransomware, is data to compute the entropy. Then, the DMA controller writes the
found, it switches the valid state to the backup state instead of new data to its destination flash memory. After transferring all of
invalid for all overwrites. So, data backup is possible without allo- the new data, it finalizes similarity and entropy, and reports them
cating additional space. However, the Read After Write detection to the firmware (FTL). Since similarity and entropy are computed
method used by FlashGuard has a false positive issue, which while data is transferred, most of their performance overhead is
makes a backup copy even in normal IO performance. In particu- hidden by parallelizing data transfer and computation.
lar, a backup is generated for every subsequent write, once the It is difficult to judge ransomware attack by considering only sim-
Read After Write pattern is executed on a specific page. So, the ilarity, entropy, and intensity individually. Amoeba uses a strong
backup space rapidly grows and the space for invalid state page ransomware classifier that considers similarity, entropy, and inten-
decreases, though there is no ransomware infection. It also sity. The RARI value is obtained by normalizing the three indicators
increases the number of page moves during GC, resulting in with the MinMaxScaler method and taking the logistic classification.
greater performance overhead due to GC. The RARI value can be formulated by the following equation:
In addition, multiple backup pages of a logical page should be
individually checked during the recovery, to find the one that is 1
r¼ ; z ¼ a  SIM þ b  ENT þ g  INT þ d: (1)
not infected by the ransomware. Finally, FlashGuard lacks proper 1 þ ez
mechanisms to control, when the backup page space massively
grows in SSDs. FlashGuard merely keeps backup space for a spe- In Equation (1), z represents the result of linear equation of the
cific period and then deletes it all. However, the speed of the page for the write request. SIM, ENT , and INT mean similarity,
backup page growth in the SSD can differ from the usage fre- entropy, and write Intensity. a, b and g mean weights and d means
quency, so that there is a risk that the backup space occupies a bias. In particular, we obtained all these values using logistic regres-
whole SSD within a short period of time. sion from machine learning. r is the RARI value of the write request
page, which means the possibility of being ransomware and is com-
puted using Equation (1). Amoeba computes the RARI value for
3 AMOEBA: DESIGN AND IMPLEMENTATION each page write operation and identifies ransomware attacks.
This section describes the backup mechanism of Amoeba. In partic-
ular, Amoeba calculates the risk of ransomware attacks for all page 3.2 Backup and Recovery
write operations. The RARI hardware module is implemented by Amoeba uses the Out-of-band (OOB) region of a page to imple-
expanding the DMA controller for internal writing to NAND flash ment the backup and recovery mechanism as described in Fig. 1.
inside the SSD. The RARI module measures the risk of all pages, The OOB region of a page contains the backup page number (BPN)
and it is used to determine whether to back up the page. and the RARI value of the page.
Ransomware Detection and Backup Operation. Fig. 2 describes the
state transition behavior mechanism of Amoeba logical pages
3.1 Ransomware Risk Calculation using Non-deterministic Finite Automata (NFA) and its states and
Amoeba’s RARI uses intensity, similarity, and entropy as indica- transitions are described in Table 1. The graphical representation
tors to determine the risk of potential ransomware attacks. of the NFA consists of states (Node) and inputs for state transition
The intensity can be easily obtained by counting the number of (Edge). Table 2 presents a description of the state and input of
write requests. It is implemented by the firmware, Flash Transla- Amoeba NFA. When the first page write occurs to a free page, its
tion Layer (FTL) at a negligible cost. However, to compute similar- state changes from OF to OV through the state transition. Next,
ity and entropy, every byte of incoming data as well as old data when the page is in the OV state, normal write requests on that
need to be accessed, which may incur excessive overhead if com- page overwrite the page.
puted by the firmware. Thus, we propose to execute them by a Amoeba backup mechanism first checks if the write request is a
Direct Memory Access (DMA) controller. pattern of the Read-After-Write for every overwrite request. Second,
An SSD controller usually has an internal DMA to transfer data it checks whether the RARI value of the current valid page is larger
from temporary buffer of the main memory to the destination than the defined threshold value. If both conditions are satisfied,
NAND flash memory. When a write request arrives from the host Amoeba will regard it as a write request of ransomware attack
interface, it is temporarily stored in the main memory of an SSD. (OWransomware ). If either of the two conditions is not satisfied, it will
The data is transferred to the destination NAND flash memory by be regarded as a normal write request (OWnormal ).
a DMA controller. While the data is being transferred, similarity The state transitions of the ransomware overwrite and normal
and entropy are calculated. overwrite depend on the state of the page (OV or VB).
To calculate similarity, the DMA controller needs to access both
new and old data. Thus, it needs to issue an additional page read  OWransomware or OWnormal upon OV State: Suppose that a
to the NAND flash memory where the old data is stored. The logical page LPNða;ovÞ has been mapped to a physical page
DMA controller reads new data from the main memory, old data PPNðb;validÞ .
IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 17, NO. 2, JULY-DECEMBER 2018 245

TABLE 1 TABLE 2
A Description of the State and Input of the NFA in Amoeba SSD Simulator Configurations

(a) Each state description in the NFA.


Q (State) Description
OF (Only Free) Data is not yet written, so it is a Free page
OV (Only Valid) Data is written and only Valid page exists
OI (Only Invalid) Data has been invalidated
VB (Valid & Backup) Both valid and backup pages exist
RCV (Recovery) Recovering data using the backup page
(b) Each state transition description in the NFA.
S" (Input) Description As the backup level is lower, the importance of the backup
Initial Write Write data to free page becomes lower since its connected valid page has less possibility of
OWransomware Ransomware overwrite being infected by the ransomware. Accordingly, if the backup state
OWnormal Normal overwrite page space becomes too large, the SSD invalidates the low level
Recovery Recover the valid page using the backup page backup pages, which have a low probability of ransomware. It
GC Valid page or backup page collected by GC restricts the size of backup state page space, thereby stabilizing the
performance of SSD.
1) When OWransomware is written to LPNða;ovÞ , the physical
4 EVALUATION
page PPNðb;validÞ in the valid state becomes PPNðb;backupÞ
in the backup state and a new physical page PPNðc;freeÞ 4.1 Experimental Setup
becomes PPNðc;validÞ in valid state. Therefore, LPNða;ovÞ Implementation. In order to evaluate the efficacy of Amoeba, we
will have both the valid page PPNðc;validÞ and the enhanced the DiskSim augmented SSD simulator developed by
backup page PPNðb;backupÞ . Then, LPNða;ovÞ changes to Microsoft Research [11] and implemented both Amoeba and Flash-
LPNða;vbÞ in VB state. Guard [9]. In particular, FlashGuard keeps the backup pages until
2) If a normal write request OWnormal occurs to LPNða;ovÞ , it times out. For simulating this, as the timeout correlates to the
a page overwrite request is immediately executed number of backup pages, we controlled the number of backup
without creating a backup page, and remains in OV pages from 1 to 8. On the other hand, Amoeba maintains only one
state. In other words, the existing mapping PPNðb;validÞ backup page per valid page. For more accurate ransomware attack
of the LPNða;ovÞ becomes PPNðb;invalidÞ , and the new detection, Amoeba uses the RARI hardware module, which is exe-
PPNðc;freeÞ becomes the PPNðc;validÞ being mapped to cuted at the DMA controller. The RARI calculation for each page is
LPNða;ovÞ . very fast, however, it has the following additional overheads: (1)
 OWransomware or OWnormal upon VB state: Suppose that a an additional page read for similarity computation and (2) extra
logical page LPNða;vbÞ is mapped to a physical page clock cycles to compute entropy after data transfer. Other computa-
PPNðc;validÞ and has a backup page PPNðb;backupÞ . In other tions (e.g., counting the number of occurences of bytes) are hidden
words, a logical page in the VB state has both a physical by parallelizing with data transfer. The overheads are measured by
page in valid state and a physical page in backup state. The simulation with the register-transfer level model of the DMA con-
backup state is maintained since one or more ransomware troller. The latency to transfer data while computing similarity and
requests have been received before. When an overwrite entropy on an 8 KB page increases by 2 percent compared to the
request is received in the VB state, a new physical page conventional DMA without computation. All these overheads are
PPNðd;freeÞ is allocated and ready for writing. Since Amoeba counted in the Amoeba DiskSim simulation.
defines all write requests (OWransomware , OWnormal ) to ran- In Amoeba, the RARI value is used to detect ransomware
somware attacks, PPNðb;backupÞ is still maintained as a attack. We used a logistic classification method to obtain weights
backup page, PPNðc;validÞ becomes PPNðc;invalidÞ and for entropy, similarity, and intensity in Equation (1) using 10 per-
PPNðd;validÞ , and LPNða;vbÞ has PPNðd;validÞ and PPNðb;backupÞ . cent of test workloads. The weights are shown in Table 2. Using
Recovery Operation after Detecting Ransomware. Pages in VB state these values, the ransomware attack detection error of the model
changed to RCV state, when the recovery is requested. The valid was less than 0.1 percent. The backup level used for the GC selec-
page is substituted by the current backup page. Existing method of tion algorithm is 2. The backup page can be only deleted when the
FlashGuard unconditionally creates a backup page for every over- SSD occupancy exceeds 90 percent. All the parameters used for the
write operation that shows a Read-After-Write pattern on a logical SSD simulation are summarized in Table 2.
page. Therefore, pages infected with ransomware are also stored as Workloads. We developed an in-house block-level content extrac-
backups, and these many backup pages should be individually tor as a Linux kernel module. The IO block content is required to cal-
investigated to find the one to be recovered by the user. However, culate the RARI value of each block. For trace collection, 3,211 files
in the proposed system a logical page has only one backup page, with a total size of 4.84 GB with characteristics of the files in Table 3,
so that it can be restored without the intervention of the user. were generated in advance. IO block and content traces were cap-
GC Selection Algorithm. When the collection operation is con- tured using the in-house block content extractor while running the
ducted by the GC, the existing SSD uses the Greedy algorithm, Erebus ransomware [12] and normal synthetic IO application on
which selects a block with the smallest number of valid pages as a those files in Table 3. In our collected traces, ransomware IOs are
victim block, in order to reduce the number of valid page copies. In around 70 percent. In particular, the indicator values for each block
order to prevent the backup page from disappearance, the GC has were calculated by offline analysis with the IO trace.
been designed to consider the backup page to be valid as well.
However, to maintain SSD not to be running out of free pages, 4.2 Results
Amoeba manages the size of backup space by setting a backup Fig. 3 shows the backup performance comparison between Flash-
level for each backup page. Each backup state has L backup levels Guard and Amoeba. For a fair comparison, the average IO
following the equation: Backup Level ¼ dr  Le, depending on the response time was measured while varying the SSD’s initial occu-
RARI value of the corresponding page in the valid state. pancy ratio. In the figure, FG(i), i means FlashGuard with the
246 IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 17, NO. 2, JULY-DECEMBER 2018

TABLE 3 TABLE 4
Workload Characteristics for Ransomware Attacks Results for Ransomware Detection Accuracy
and Recovery Cost Comparisons
Number Size
Type
Num % Avg (KB) Total (MB) %
pdf 1114 34.69 926.58 1008.02 20.31
html 307 9.56 51.70 15.50 0.31
image files 357 11.12 166.97 58.21 1.17
xls 318 9.90 363.07 112.75 2.27
ppt 125 3.89 1483.33 181.07 3.65
doc 74 2.30 428.70 30.98 0.62
zip files 123 3.83 12292.58 1476.31 29.75
others 793 24.69 4404.65 2080.24 41.92
Total 3211 100 1582.745 4963.08 100
Amoeba embeds a special RARI computation hardware on the
DMA module for fast ransomware detection and performs autono-
mous backup and recovery within the device. The experimental
results demonstrate the backup overhead is negligible while mini-
mizing the error of ransomware attacks.

ACKNOWLEDGMENTS
This work was supported by the National Research Foundation
of Korea (NRF) grant funded by the Korea Government (MSIT)
(No. NRF-2018R1A1A1A05079398).

Fig. 3. Performance comparisons of response times and GC counts for different


SSD occupancy ratios. In (b), the error bars are shown in min and max of GC calls
REFERENCES
across SSD elements in the SSD. [1] D. Goodin, “A new ransomware outbreak similar to WCry is shutting
down computers worldwide,” 2017. [Online]. Available: https://
arstechnica.com/security/2017/06/a-new-ransomware-outbreak-similar-t
number of backup pages in i. In Fig. 3a, we observe that Amoeba o-wcry-is-shutting-down-computers-worldwide/
has response times almost similar to the baseline. FlashGuard, on [2] J. Lambert, “Atlanta spent $2.6m to recover from a $52,000 ransomware
scare,” 2018. [Online]. Available: https://www.wired.com/story/atlanta-
the other hand, shows a drop in performance as the number of spent-26m-recover-from-ransomware-scare/
backup pages increases and the SSD occupancy ratio increases. [3] N. Scaife, H. Carter, P. Traynor, and K. R. B. Butler, “Cryptolock (and drop
From Fig. 3b, we observe that this performance degradation should it): Stopping ransomware attacks on user data,” in Proc. IEEE 36th Int. Conf.
be attributed to the increase in the number of GC calls. The more Distrib. Comput. Syst., Jun. 2016, pp. 303–312.
[4] C. Moore, “Detecting ransomware with honeypot techniques,” in Proc.
backup pages the SSD keeps, the less often free pages are freed, Cybersecurity Cyberforensics Conf., Aug. 2016, pp. 77–81.
and the GC is more frequently invoked. Specifically, in Fig. 3a, [5] M. M. Ahmadian and H. R. Shahriari, “2entFOX: A framework for high sur-
when comparing FG(4) and Amoeba, we see that Amoeba’s vivable ransomwares detection,” in Proc. 13th Int. Iranian Soc. Cryptology
Conf. Inf. Secur. Cryptology, Sep. 2016, pp. 79–84.
response time is up to about 12 percent higher than FlashGuard. [6] K. Cabaj and W. Mazurczyk, “Using software-defined networking for ran-
This is because Amoeba identifies the ransomware by considering somware mitigation: The case of cryptowall,” IEEE Netw., vol. 30, no. 6,
both the Read-After-Write I/O patterns and the RARI value of each pp. 14–20, Nov. 2016.
[7] M. M. Ahmadian, H. R. Shahriari, and S. M. Ghaffarian, “Connection-moni-
page, while FlashGuard detects ransomware only with the Read- tor connection-breaker: A novel approach for prevention and detection of
After-Write patterns, thus FlashGuard generates more unnecessary high survivable ransomwares,” in Proc. 12th Int. Iranian Soc. Cryptology
backup pages than Amoeba. Conf. Inf. Secur. Cryptology, Sep. 2015, pp. 79–84.
[8] A. Continella, A. Guagnelli, G. Zingaro, G. De Pasquale, A. Barenghi,
Next, we compare the detection accuracy of ransomware and S. Zanero, and F. Maggi, “ShieldFS: A self-healing, ransomware-aware fil-
recovery cost for Amoeba and FlashGuard. Table 4a shows the esystem,” in Proc. 32nd Annu. Conf. Comput. Secur. Appl., 2016, pp. 336–347.
comparisons for the number of FP and FN determinations while [9] J. Huang, J. Xu, X. Xing, P. Liu, and M. K. Qureshi, “FlashGuard: Leverag-
ing intrinsic flash properties to defend against encryption ransomware,” in
running the workloads on each system. Overall, we see that Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2017, pp. 2231–2244.
Amoeba shows high ransomware detection accuracy because in [10] S. Baek, Y. Jung, A. Mohaisen, S. Lee, and D. Nyang, “Ssd-insider: Internal
Amoeba, the total ratio of FP and FN is 2.58 percent while Flash- defense of solid-state drive against ransomware with perfect data recov-
Guard shows 27.59 percent of the total false ratio. In FlashGuard, ery,” in Proc. IEEE 38th Int. Conf. Distrib. Comput. Syst., 2018, pp. 875–884.
[11] N. Agrawal, V. Prabhakaran, T. Wobber, J. D. Davis, M. Manasse, and
IO is determined as ransomware attack if it only follows a pattern R. Panigrahy, “Design Tradeoffs for SSD Performance,” in Proc. USENIX
of Read-After-Write. On the other hand, Amoeba compares both 2008 Annu. Tech. Conf., 2008, pp. 57–70.
RARI values as well as Read-After-Write patterns, thus allowing to [12] T. MICRO, “Erebus Linux ransomware: Impact to servers and counter-
measures,” 2017. [Online]. Available: https://www.trendmicro.com/
identify ransomware more accurately. vinfo/us/security/news/cyber-attacks/erebus-linux-ransomware-impact-
The cost of recovery determines the time until the system is to-servers-and-countermeasures
restored to normal. In particular, it is very important to quickly
" For more information on this or any other computing topic,
find the pages that need to be restored during the recovery. Thus,
for evaluations, we compared the total number of accumulated please visit our Digital Library at www.computer.org/publications/dlib.
pages searched during the recovery attempts for one to four ran-
somware attacks. Table 4b shows FlashGuard needs up to four
times more search cost than Amoeba.

5 CONCLUSION
This paper proposes Amoeba, an autonomous backup and rec-
overy SSD to defend against ransomware attacks. Specifically,

You might also like