Detect the ransomware and take action to mitigate problem

Assignment Help Other Subject
Reference no: EM133236626

Assignment Project -

Description - This project will be focused on a study of ransomware attacks and the related mitigation techniques. You will be working on a virtual machine (VM) in order to ensure the required isolation. You must not work on the project directly on your host machine as it may cause damage to your operating system and personal data.

For the attack part, you will develop your own ransomware tool, which will infect your guest OS in the VM and encrypt a designated directory. For the cybersecurity part, you will detect the ransomware and take action to mitigate the problem. For that purpose, you need to monitor the activities on your guest VM, detect if there is a ransomware, block it, and attempt recovery.

Project Plan - You will follow the steps listed below. You are recommended to submit a short memo describing your progress at each step-via Canvas. These memos will be used by instructor to guide your work on the project. The memos will not be formally graded, and they will receive no credit.

Of course, you are welcome to communicate with the instructor for guidance at any time. You have a freedom to select your favorite methods and approaches at every step. Also, you may use an operating system of your choice for the victim machine (as long as it is available as a guest OS VM). For these reasons, each project is expected to have a unique structure. Note that the instructors we will be checking the submitted code and reports for similarities.

1. Research on ransomware techniques: First, you need to do a basic literature survey on ransomware in order to figure out how this type of malware works. There are multiple approaches for building ransomware. You may select one of them or come up with your own.

Preparing the project plan. For each of Steps 2-5, select a specific method, which you will implement for your project components. Due: 10/07.

2. Action: In this step, you will implement your own ransomware. You are expected to write all the code yourself. You may use libraries for encryption/decryption, but other parts of the code are supposed to be your own. Specifically, your ransomware should encrypt a given directory recursively, i.e., all its subdirectories and files in them. Write the encryption/decryption component.

3. Infection: In this step, you need to implement a method for infecting a victim. You may use phishing, a hidden executable in a file, a hidden executable in a website, or any other method. For this step, you may use existing cybersecurity attack toolsets. However, you need to implement your method and demonstrate that it is successful. Write the infection (malicious code delivery) component.

4. Monitoring: To be able to detect a ransomware, we need to be able to monitor your environment. Write your own detection tool. You may use external libraries to help your monitoring activities, but the implementation needs to be your own, using your own code. The monitored data must be also logged in a database or other structured file. Write the monitoring/auditing component.

5. Detection: You may use the existing approaches, but the implementation must be your own solution. For example, you may check the data obtained in the previous step against some set of rules, match it to a certain pattern, or even use machine learning. An important point is to demonstrate that your tool successfully detects ransomware, without creating false positives for legitimate processes. Write the detection component.

6. Mitigation: For the mitigation part, you need to come up with a solution to block the ransomware process and to attempt recovery. Of course, if ransomware is implemented properly, then recovery may be difficult or impossible, depending on when detection happened. In any case, all aspects of the mitigation process, including prevention must be discussed in detail. Write the defense/recovery component.

Deliverables - At the end of the project, you will submit the following three deliverables:

Project code: It will include all the code written by the students along with a README file that shows step-by-step instructions on how to duplicate your environment.

In particular, it must have information on the environment, libraries needed, the dependencies, and others. Your code must be properly commented.

Demo video: It will include a demonstration of your implementation and its features, showing how it works, what it does, and confirming that it works successfully. o Maximum length of the video: 15 minutes. (The grader will base their evaluation on the first 15 minutes.)

Report: You need to follow an outline of a regular research paper. In particular, it should contain:

Abstract: A brief overview of your project. Approximately 250 words.

Introduction: Explaining the problem you are trying to solve, why it is an important problem, a brief overview of your approach, a brief overview of your accomplishments, etc. This section should take approximately one page.

Related works: The explanation of other studies and paper that you have found. You need to present what the others have done, how, what they have observed, etc. At least 4-5 sources need to be presented and summarized. This section should take approximately one page.

Approach: For each step of the project, you need to explain your approach, your architecture, steps, implementation details, and so on. This is the main part of your report and it should take around 2 pages.

Results: You need to present your results here. This section should take approximately one page.

References: Add the references (bibliography) in the IEEE format.

Reference no: EM133236626

Questions Cloud

Positive and negative aspects of christianity : In this final portion of Helga's journey, she finds religion. How does Larsen showcase both positive and negative aspects of Christianity?
How hashing can be useful in the establishment : Discuss the role randomness plays in hashing (with example). Next, explain how hashing can be useful in the establishment and the maintenance of secure communic
Social pressure to conform to certain physical shape : With women especially, there is a lot of social pressure to conform to a certain physical shape.
Literature to make cross-curricular content connections : Using literature to make cross-curricular content connections can support differentiated instruction and help to meet the needs of diverse students.
Detect the ransomware and take action to mitigate problem : CSCE 5550 Assignment Project - For the cybersecurity part, you will detect the ransomware and take action to mitigate the problem
About human nature and to know himself or herself in process : Are there of Hawthorne's characters that truly come to know something about human nature and to know himself or herself in the process?
Interpreted ending in sorrowful woman : The way that I interpreted the ending in The Sorrowful Woman, she took her own life to escape the pain. In The Yellow Wallpaper, she killed her husband not know
War profit litany by allen ginsberg : Search up the poem "War Profit Litany" by Allen Ginsberg. The poem should start with" these are the names of the companies
Explain the Job Analysis process : Explain the Job Analysis process and determine how organizations develop their compensation philosophy into Human Resource management

Reviews

len3236626

1/2/2023 8:47:11 PM

Preparing the project plan. For each of Steps 2-5, select a specific method, which you will implement for your project components. steps 2 to 5 can be found in the above attached document This project will be focused on a study of ransomware attacks and the related mitigation techniques. You will be working on a virtual machine (VM) in order to ensure the required isolation. You must not work on the project directly on your host machine as it may cause damage to your operating system and personal data. For the attack part, you will develop your own ransomware tool, which will infect your guest OS in the VM and encrypt a designated directory.............

Write a Review

Other Subject Questions & Answers

  How do opposing societal values impact policy decision

How do theories of problem etiology (hypothesis of causation) influence policy formation and subsequent program implementation?

  Primary reason for delay

Though World War I began in Europe in 1914, the United States did not enter the war until 1917. What was the primary reason for this delay?

  Discuss the relationship of continuing nursing education

Discuss the relationship of continuing nursing education to competency, attitudes, knowledge and The ANa Scope and Standards for Practice and Code of Ethics

  How risk can be understood and rated fairly easily

The author proposed one methodology as an example of how risk can be understood and rated fairly easily. However, there are other methodologies, would you use.

  Define the evidence of anthropogenic global warming

the thousands of years of data that do not support anthropogenic global warming, exactly what is the evidence of anthropogenic global warming

  What is the scope of the degree programs offered

Is the institution a community college, private or public liberal arts college, proprietary university, career college, etc.? What is the scope of the degree programs offered? How many? What general kinds? What is your mission statement?

  Experiencing the experimental manipulation

The logic of an experiment is which when one group that experiences the experimental manipulation and other group do not, any differences in subsequent behavior are due to independent variable. This conclusion is true when:

  Critically analyse the key ethical and legal issues

Critically analyse the key ethical and legal issues associated with MKGW accepting the SPG audit engagement and make recommendations for how/if these issues can

  Write paper written on racism and gender equality in america

Write a 3-4 page paper written on "racism and gender equality in america" with references or sources without plagrism.

  Discuss a contemporary educational issue

Write a paper that critically discusses a contemporary educational issue in which biblical principles conflict with legal and societal expectations.

  Demonstrate a connection to your desired work environment

Provide a reflection of at least 500 words (double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied.

  Examine the symbolic purpose of the naked blonde in battle

analyze the symbolic purpose of the naked blonde in battle royal by ellison. consider her purpose in the text and how

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd