SlideShare a Scribd company logo
1 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
AI for Ransomware Detection & Prevention Insights from Patents
Alex G. Lee1
Ransomware has become a major cybersecurity threat over the past few years. In 2017, a ransomware
attack known as WannaCry become of the biggest cybersecurity attacks ever to hit globally. It shut down
hospitals, impacted telecommunications companies, and spread to over 150 countries and
approximately 300,000 devices. It is estimated to have cost enterprises upwards of $5 billion in damages
annually. Ransomware is a malware that is designed to prevent users to access their computers by
locking screen or data by encrypting the data using a strong encryption algorithm known only to the
attacker. One difficulty with ransomware attack is that it is resistant to normal data recovery techniques,
such as backups. Incremental backups keep copies of the user's data, but when a file is encrypted and
then stored with the same name and extension as the original file, the encrypted file overwrites the good
file in the next incremental backup. Even a quality cloud backup solution that maintains a number of file
versions can be susceptible to this type of attack, as it can be impractical or problematic for users to find
and restore a last good version of every file in a directory structure that can have many thousands of
individual files. Furthermore, ransomware cannot be defeated by simply resetting the computer or the
operating system to a known good state. Even if the device itself can be restored to a known good state,
the user's original data or their backups may still be encrypted.
                                                            
1
Alex G. Lee, Ph.D Esq., is a principal consultant and patent attorney at TechIPm, LLC.
2 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
Conventional attempts to solve these challenges have drawbacks. For example, a heuristic system
monitors file I/O patterns (such as read/write/delete/rename) and frequencies. The I/O patterns can be
compared to heuristic models to detect irregularities in the pattern. But ransomware can workaround to
these heuristic solutions by encrypting files without changing ransomware only at certain intervals or
once the machine is idle to make it difficult to distinguish the ransomware attack from ordinary file
activity. Static analysis-based solutions scan process memory (either before unpacking or after
unpacking) to look for known signatures. But, ransomware can avoid detection by using different
signatures. AI can provide an effective solution in detecting malware as an alternative to the use of
signatures.
Patents are a good information resource for obtaining the state of the art of AI technology innovations for
defending against the ransomware attacks. Patent information can provide many valuable insights that
can be exploited for developing and implementing new technologies. Patents can also be exploited to
identify new product/service development opportunities.
3 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
AI for Ransomware Detection
US20210019403 illustrates an AI application method for identifying and mitigating ransomware attacks.
The method provides an operating system and file system agnostic way of classifying a computer
program as behaving like ransomware or not. The program need not be previously known or trusted. In
other words, even a ‘zero-day’ ransomware attack that exploiting unknown vulnerability in hardware or
software can be mitigated with the method provided.
The AI application method analyzes file content, and when a file is written or newly created on the disk
by a program. A ransomware mitigation engine determines whether the file has been compromised by a
ransomware attack. The file marked as ransomware or as compromised if the ransomware mitigation
engine determines that the file has been compromised. The file analysis can be accomplished by using
a deep learning classification layer (e.g., convolutional neural network) to identify a file type of the file,
which combines with a heuristic layer to check the byte distribution in the file content for predicting
whether the file appears to be encrypted using a statistical analysis (e.g., entropy). Once the examined
file is determined as having been compromised by a ransomware attack, the ransomware mitigation
engine takes a remedial action such as creating a backup of the file and restoring the file from the
backup.
4 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
US20200034537 illustrates a system that detects ransomware infection in file systems. The system
detects ransomware infection in two stages. In the first stage, the system analyzes a file system's
behavior. The file system's behavior can be obtained by loading the backup data and crawling the file
system to create a file system metadata (e.g., a list of entries corresponding to data changes in the file
system) including information about file operations during a time interval. The system determines a
pattern of the file operations using the set of machine learning models trained to determine the pattern of
the file operations. The system compares the pattern to a normal patter to analyze the file system's
behavior based on features representing the file system's behavior. If the file system's behavior is
abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of
encryption in the file system. The system combines the analysis of both stages to determine whether the
file system is infected by ransomware.
It is challenging for the backup service provider to determine whether an encrypted file received by the
backup service provider from a customer for storage is encrypted only by a normal encryption process or
whether the encrypted file contains a ransomware encryption as well. US20200042703 illustrates a
system that detects ransomware detection of encrypted files. The system applies an anomaly detection
technique to the metadata for an encrypted file to compare attributes (e.g., file extension/ size/name) in
the metadata to corresponding historical baseline values for the attributes. The anomaly detection
technique comprises a machine learning model that is trained using historical time-series data for each
5 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
of file types. The system determines whether the encrypted file comprises a ransomware encryption
based on the comparison.
6 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
AI for Ransomware Prevention
Most effective defense against a ransomware attack is a detection of the malware when downloading to
the victim computer, which can prevent an attack vector from penetrating a victim’s host computer.
Following approaches can mitigate ransomware attacks: 1) backing-up data frequently to back-up
storage devices that cab be disconnected from the network before and after the back-up operation is
performed; 2) training people on risky security scenarios, such as avoiding clicking on malicious links in
phishing emails and spear-phishing campaigns; avoiding opening suspicious email attachments; avoid
clicking malicious advertisements on websites; avoid plugging in potentially infected USB s found in
untrusted locations; and 3) firewalls that can help block known suspicious IP addresses and domains
from communicating with devices in your network, that could host ransom ware command & control
servers.
US20180248896 illustrates an anti-ransomware system that has a deception component comprising a
decoy module to place and monitor decoy segments within file systems. Decoy files and folders contain
common file types that ransomware attackers target. The purposes of the decoys are i) alerting about
ransomware-like behavior, ii) alerting about “snooping” on the computer, iii) potentially storing anti-
malware components disguised as decoys, iv) slowing down the encryption process, yielding additional
7 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
response time, v) deterring attackers, vi) allowing additional opportunities to recover the key, or learn
how to recover files.
The anti-ransomware system includes a behavioral analysis module to analyze the behavior of a
suspected ransomware to monitor ransomware activities in real time using a machine learning module
for determining a file system baseline of the computer file structure.  The machine learning module
observes the normal processes of the machine, including behavior that results in large changes at one
time to particular files, such as encrypting files within normal use of the computer, that weren't previously
encrypted or representing user content. Once a file change activity exceeds a threshold, the anti-
ransomware system takes action by notifying the response component.
The response component has a suspend/kill module to suspend the suspected ransomware, a restore
files module to restore files from an on-demand backup system, a capture encryption key module to
retrieve the encryption used by the suspected ransomware, and a quarantine module to quarantine the
suspected ransomware on the device, and to quarantine the device off the network, to prevent spread of
infection.
8 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
Cybersecurity & Privacy in ESG Digital Transformation Webinar
Recent ransomware cyberattack on a major oil pipeline caused gas prices to surge and gas stations in
multiple states to experience shortages due to a several-day outage resulting from the attack.
In 2020, a major cyberattack by a group backed by the Russian government caused series of data
breaches in the United States federal government. These two cases illustrate the serious harm of
cyberattacks and data breaches to society and individuals.
As the world recovers from COVID-19 pandemic, ESG (Environmental, Social, and Governance) DX
(digital transformation) will be accelerated. As ESG DX is accelerated, cybersecurity and privacy
protection will be the top ESG risk management concern for corporations and their stakeholders.
In the webinar, Alex G. Lee, Ph.D., Esq. (https://www.linkedin.com/in/alexgeunholee/) will present the
potential risks of cybersecurity & privacy in ESG DX. Specifically, Alex will present the state of the art
innovations of AI, Blockchain, IoT and their convergence for cybersecurity & privacy in ESG DX. Alex
will present specific technical details about the use cases of AI, Blockchain, IoT and their convergence
for cybersecurity & privacy in ESG DX based on related patents analysis.
9 
 
©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 
 
Alex will also present demos of an innovative cybersecurity solution (Zeus) for protecting systems of
digital infrastructure and a cloud based big data/computing platform (Xanadu) for protection against
ransomware.
Place: Online Zoom meeting
Time: June 16, 2021 7 pm – 9.00 pm Eastern Time/EDT (US and Canada)
June 16, 2021 4 pm – 6.00 pm Pacific Time/PST (US and Canada)
June 17, 2021 8 am – 10.00 am GMT+9 Time Zone (S. Korea and Japan)
Registration: https://www.eventbrite.com/e/cybersecurity-privacy-in-esg-digital-transformation-webinar-
tickets-
156172081901?utm_source=eventbrite&utm_medium=email&utm_campaign=post_publish&utm_conten
t=shortLinkNewEmail
Ad

More Related Content

What's hot (20)

Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Katherine Duffy
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
Fortis
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
kevinmass30
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your System
ClickSSL
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
Bright Technology
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
OK2OK
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
Lai Yoong Seng
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
ClearDATACloud
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Storage Switzerland
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
Yash Diwakar
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
ErnestStaats
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
Bret Piatt
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
marketingunitrends
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
Vijay Sarathy Rangayyan
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
Kenny Huang Ph.D.
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
InnoTech
 
Ransomware
RansomwareRansomware
Ransomware
Nick Miller
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
marketingunitrends
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
Raghavendra P.V
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
Charles Steve
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Katherine Duffy
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
Fortis
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
kevinmass30
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your System
ClickSSL
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
Bright Technology
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
OK2OK
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
Lai Yoong Seng
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
ClearDATACloud
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Storage Switzerland
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
Yash Diwakar
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
ErnestStaats
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
Bret Piatt
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
marketingunitrends
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
Vijay Sarathy Rangayyan
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
Kenny Huang Ph.D.
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
InnoTech
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
marketingunitrends
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
Raghavendra P.V
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
Charles Steve
 

Similar to AI for Ransomware Detection & Prevention Insights from Patents (20)

It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
Fathoni Mahardika II
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
phanleson
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Ransomware
RansomwareRansomware
Ransomware
m3 Networks Limited
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
Cisco Canada
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
Tharindu Edirisinghe
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET Journal
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
EMC
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
UltraUploader
 
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
Virtualizacion y sistemas operativos por microsoft. Contempla seguridadVirtualizacion y sistemas operativos por microsoft. Contempla seguridad
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
AJ florez
 
Mitppt
MitpptMitppt
Mitppt
Aarti Prakash
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
EMC
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
Martin Holovský
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
How To Prevent Ransomware
How To Prevent RansomwareHow To Prevent Ransomware
How To Prevent Ransomware
RansomwareEditor
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
phanleson
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
Cisco Canada
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET Journal
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
EMC
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
UltraUploader
 
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
Virtualizacion y sistemas operativos por microsoft. Contempla seguridadVirtualizacion y sistemas operativos por microsoft. Contempla seguridad
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
AJ florez
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
EMC
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
Martin Holovský
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
Ad

More from Alex G. Lee, Ph.D. Esq. CLP (20)

[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability Convergence
Alex G. Lee, Ph.D. Esq. CLP
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World Assets
Alex G. Lee, Ph.D. Esq. CLP
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent Analysis
Alex G. Lee, Ph.D. Esq. CLP
 
Maximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsMaximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Real-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationReal-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi Integration
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability OverviewMetaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability Overview
Alex G. Lee, Ph.D. Esq. CLP
 
AI for Metaverse x Web3 Overview
AI for Metaverse x Web3 OverviewAI for Metaverse x Web3 Overview
AI for Metaverse x Web3 Overview
Alex G. Lee, Ph.D. Esq. CLP
 
NFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders RoundtableNFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders Roundtable
Alex G. Lee, Ph.D. Esq. CLP
 
Fame Universe Introduction
Fame Universe IntroductionFame Universe Introduction
Fame Universe Introduction
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse Fashion Overview
Metaverse Fashion OverviewMetaverse Fashion Overview
Metaverse Fashion Overview
Alex G. Lee, Ph.D. Esq. CLP
 
Global Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators RoadshowGlobal Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators Roadshow
Alex G. Lee, Ph.D. Esq. CLP
 
NFT Financialization Overview
NFT Financialization OverviewNFT Financialization Overview
NFT Financialization Overview
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business Development
Alex G. Lee, Ph.D. Esq. CLP
 
NFT Monetization Innovation Webinar
NFT Monetization Innovation WebinarNFT Monetization Innovation Webinar
NFT Monetization Innovation Webinar
Alex G. Lee, Ph.D. Esq. CLP
 
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
Alex G. Lee, Ph.D. Esq. CLP
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdf
Alex G. Lee, Ph.D. Esq. CLP
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
Alex G. Lee, Ph.D. Esq. CLP
 
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
NAVIGATING THE METAVERSE (Wiley)  One Page Book SummaryNAVIGATING THE METAVERSE (Wiley)  One Page Book Summary
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
Alex G. Lee, Ph.D. Esq. CLP
 
FAME Universe Introduction
FAME Universe IntroductionFAME Universe Introduction
FAME Universe Introduction
Alex G. Lee, Ph.D. Esq. CLP
 
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability Convergence
Alex G. Lee, Ph.D. Esq. CLP
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World Assets
Alex G. Lee, Ph.D. Esq. CLP
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent Analysis
Alex G. Lee, Ph.D. Esq. CLP
 
Maximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsMaximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Real-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationReal-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi Integration
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business Development
Alex G. Lee, Ph.D. Esq. CLP
 
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
Alex G. Lee, Ph.D. Esq. CLP
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdf
Alex G. Lee, Ph.D. Esq. CLP
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
Alex G. Lee, Ph.D. Esq. CLP
 
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
NAVIGATING THE METAVERSE (Wiley)  One Page Book SummaryNAVIGATING THE METAVERSE (Wiley)  One Page Book Summary
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
Alex G. Lee, Ph.D. Esq. CLP
 
Ad

Recently uploaded (20)

How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 

AI for Ransomware Detection & Prevention Insights from Patents

  • 1. 1    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    AI for Ransomware Detection & Prevention Insights from Patents Alex G. Lee1 Ransomware has become a major cybersecurity threat over the past few years. In 2017, a ransomware attack known as WannaCry become of the biggest cybersecurity attacks ever to hit globally. It shut down hospitals, impacted telecommunications companies, and spread to over 150 countries and approximately 300,000 devices. It is estimated to have cost enterprises upwards of $5 billion in damages annually. Ransomware is a malware that is designed to prevent users to access their computers by locking screen or data by encrypting the data using a strong encryption algorithm known only to the attacker. One difficulty with ransomware attack is that it is resistant to normal data recovery techniques, such as backups. Incremental backups keep copies of the user's data, but when a file is encrypted and then stored with the same name and extension as the original file, the encrypted file overwrites the good file in the next incremental backup. Even a quality cloud backup solution that maintains a number of file versions can be susceptible to this type of attack, as it can be impractical or problematic for users to find and restore a last good version of every file in a directory structure that can have many thousands of individual files. Furthermore, ransomware cannot be defeated by simply resetting the computer or the operating system to a known good state. Even if the device itself can be restored to a known good state, the user's original data or their backups may still be encrypted.                                                              1 Alex G. Lee, Ph.D Esq., is a principal consultant and patent attorney at TechIPm, LLC.
  • 2. 2    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    Conventional attempts to solve these challenges have drawbacks. For example, a heuristic system monitors file I/O patterns (such as read/write/delete/rename) and frequencies. The I/O patterns can be compared to heuristic models to detect irregularities in the pattern. But ransomware can workaround to these heuristic solutions by encrypting files without changing ransomware only at certain intervals or once the machine is idle to make it difficult to distinguish the ransomware attack from ordinary file activity. Static analysis-based solutions scan process memory (either before unpacking or after unpacking) to look for known signatures. But, ransomware can avoid detection by using different signatures. AI can provide an effective solution in detecting malware as an alternative to the use of signatures. Patents are a good information resource for obtaining the state of the art of AI technology innovations for defending against the ransomware attacks. Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
  • 3. 3    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    AI for Ransomware Detection US20210019403 illustrates an AI application method for identifying and mitigating ransomware attacks. The method provides an operating system and file system agnostic way of classifying a computer program as behaving like ransomware or not. The program need not be previously known or trusted. In other words, even a ‘zero-day’ ransomware attack that exploiting unknown vulnerability in hardware or software can be mitigated with the method provided. The AI application method analyzes file content, and when a file is written or newly created on the disk by a program. A ransomware mitigation engine determines whether the file has been compromised by a ransomware attack. The file marked as ransomware or as compromised if the ransomware mitigation engine determines that the file has been compromised. The file analysis can be accomplished by using a deep learning classification layer (e.g., convolutional neural network) to identify a file type of the file, which combines with a heuristic layer to check the byte distribution in the file content for predicting whether the file appears to be encrypted using a statistical analysis (e.g., entropy). Once the examined file is determined as having been compromised by a ransomware attack, the ransomware mitigation engine takes a remedial action such as creating a backup of the file and restoring the file from the backup.
  • 4. 4    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    US20200034537 illustrates a system that detects ransomware infection in file systems. The system detects ransomware infection in two stages. In the first stage, the system analyzes a file system's behavior. The file system's behavior can be obtained by loading the backup data and crawling the file system to create a file system metadata (e.g., a list of entries corresponding to data changes in the file system) including information about file operations during a time interval. The system determines a pattern of the file operations using the set of machine learning models trained to determine the pattern of the file operations. The system compares the pattern to a normal patter to analyze the file system's behavior based on features representing the file system's behavior. If the file system's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the file system. The system combines the analysis of both stages to determine whether the file system is infected by ransomware. It is challenging for the backup service provider to determine whether an encrypted file received by the backup service provider from a customer for storage is encrypted only by a normal encryption process or whether the encrypted file contains a ransomware encryption as well. US20200042703 illustrates a system that detects ransomware detection of encrypted files. The system applies an anomaly detection technique to the metadata for an encrypted file to compare attributes (e.g., file extension/ size/name) in the metadata to corresponding historical baseline values for the attributes. The anomaly detection technique comprises a machine learning model that is trained using historical time-series data for each
  • 5. 5    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    of file types. The system determines whether the encrypted file comprises a ransomware encryption based on the comparison.
  • 6. 6    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    AI for Ransomware Prevention Most effective defense against a ransomware attack is a detection of the malware when downloading to the victim computer, which can prevent an attack vector from penetrating a victim’s host computer. Following approaches can mitigate ransomware attacks: 1) backing-up data frequently to back-up storage devices that cab be disconnected from the network before and after the back-up operation is performed; 2) training people on risky security scenarios, such as avoiding clicking on malicious links in phishing emails and spear-phishing campaigns; avoiding opening suspicious email attachments; avoid clicking malicious advertisements on websites; avoid plugging in potentially infected USB s found in untrusted locations; and 3) firewalls that can help block known suspicious IP addresses and domains from communicating with devices in your network, that could host ransom ware command & control servers. US20180248896 illustrates an anti-ransomware system that has a deception component comprising a decoy module to place and monitor decoy segments within file systems. Decoy files and folders contain common file types that ransomware attackers target. The purposes of the decoys are i) alerting about ransomware-like behavior, ii) alerting about “snooping” on the computer, iii) potentially storing anti- malware components disguised as decoys, iv) slowing down the encryption process, yielding additional
  • 7. 7    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    response time, v) deterring attackers, vi) allowing additional opportunities to recover the key, or learn how to recover files. The anti-ransomware system includes a behavioral analysis module to analyze the behavior of a suspected ransomware to monitor ransomware activities in real time using a machine learning module for determining a file system baseline of the computer file structure.  The machine learning module observes the normal processes of the machine, including behavior that results in large changes at one time to particular files, such as encrypting files within normal use of the computer, that weren't previously encrypted or representing user content. Once a file change activity exceeds a threshold, the anti- ransomware system takes action by notifying the response component. The response component has a suspend/kill module to suspend the suspected ransomware, a restore files module to restore files from an on-demand backup system, a capture encryption key module to retrieve the encryption used by the suspected ransomware, and a quarantine module to quarantine the suspected ransomware on the device, and to quarantine the device off the network, to prevent spread of infection.
  • 8. 8    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    Cybersecurity & Privacy in ESG Digital Transformation Webinar Recent ransomware cyberattack on a major oil pipeline caused gas prices to surge and gas stations in multiple states to experience shortages due to a several-day outage resulting from the attack. In 2020, a major cyberattack by a group backed by the Russian government caused series of data breaches in the United States federal government. These two cases illustrate the serious harm of cyberattacks and data breaches to society and individuals. As the world recovers from COVID-19 pandemic, ESG (Environmental, Social, and Governance) DX (digital transformation) will be accelerated. As ESG DX is accelerated, cybersecurity and privacy protection will be the top ESG risk management concern for corporations and their stakeholders. In the webinar, Alex G. Lee, Ph.D., Esq. (https://www.linkedin.com/in/alexgeunholee/) will present the potential risks of cybersecurity & privacy in ESG DX. Specifically, Alex will present the state of the art innovations of AI, Blockchain, IoT and their convergence for cybersecurity & privacy in ESG DX. Alex will present specific technical details about the use cases of AI, Blockchain, IoT and their convergence for cybersecurity & privacy in ESG DX based on related patents analysis.
  • 9. 9    ©2021 TechIPm, LLC All Rights Reserved http://www.techipm.com/    Alex will also present demos of an innovative cybersecurity solution (Zeus) for protecting systems of digital infrastructure and a cloud based big data/computing platform (Xanadu) for protection against ransomware. Place: Online Zoom meeting Time: June 16, 2021 7 pm – 9.00 pm Eastern Time/EDT (US and Canada) June 16, 2021 4 pm – 6.00 pm Pacific Time/PST (US and Canada) June 17, 2021 8 am – 10.00 am GMT+9 Time Zone (S. Korea and Japan) Registration: https://www.eventbrite.com/e/cybersecurity-privacy-in-esg-digital-transformation-webinar- tickets- 156172081901?utm_source=eventbrite&utm_medium=email&utm_campaign=post_publish&utm_conten t=shortLinkNewEmail