In this paper, we aim at easing the damage caused
by ransomware to edge server by proposing a self-
recovery method, called Self-Recovery Service
(SRS), for edge server. SRS can detect ransomware
signature and recover victim files automatically. Its
concept is to monitor important files by a system
service. If ransomware is detected, SRS recovers
infected files by restoring the corresponding backup
of raw data. No interruption would be caused to the
operation of edge server. The service only takes
insignificant system resources for its operation that
does not degrade the performance of the server.
The remaining of this paper is organized as
follows. In Section 2, we review the ransomware
attack. In Section 3, we present the design of SRS.
Section 4 will highlight the verification of SRS.
Finally, we conclude this paper in Section 5.
2 RANSOMWARE ATTACK
Ransomware is a kind of malicious trojan horse
program which is secretly injected into victim's
devices (computers, smartphones, servers, etc.) and
interferes with their operation by encrypting some
important files, such as user data files or system files.
To rescue the files and even save the devices, the
decrypting key is needed which can be obtained by
paying for the ransom (O'Gorman & McDonald,
2012). In 1989, the first ransomware, called PC
Cyborg, had successfully forced the user to pay a
ransom of $189 by encrypting its hard disk (Gazet,
2010).
There are five types of ransomware reported
(Johansen, 2018), which are Crypto malware,
Lockers, Scareware, Doxware and RaaS. Crypto
malware is a well-known ransomware that can spread
over thousands of computers and make damages
worldwide. One of the noticeable examples is
WannaCry; Lockers is another type of ransomware
that aims to attack operating system. It locks down a
victim’s computer. No files or applications can be
accessed; Similarly, Scareware would lock down a
victim’s computer and pop up annoying messages to
ask for ransom; Doxware is another type of
ransomware that may reveal a victim’s sensitive
information. It threatens the victim by posting the
information online, if ransom is not paid; The last
one, called “Ransomware as a Service (RaaS)”,
contributed greatly to the growth of ransomware
attack because it enables anyone to be a cyber
attacker. RaaS is deployed as a portal that enables
legitimate venders to unintentionally setup malicious
services to their customers (victims).
Ransomware has been evolved gradually since
1989. It has expanded their scope of attack on devices
from computers to mobile devices, covering
individuals, enterprises, governments, medical
institutions, banking systems, etc. A number of attack
cases have been reported, including Hollywood
hospital network system and Muni subway in San
Francisco. They targeted the healthcare industry and
government organizations because it makes
significant impact to the public. In 2016, the first
ransomware for mobile devices, called “Gooligan”
has been reported, which led to 1 million Android
devices being attacked, by maliciously obtaining the
root permission of the devices (Adhikari, 2016).
There are a number of methods to inject
ransomware into edge servers: 1) by injecting
malicious scripts/codes or 2) by compromising an
edge server to spoof other edge servers. In 1), an
escape character can be used to attach malicious
string into a SQL query that can spoof the database to
execute the string, loading unexpected file remotely
into an edge server (victim) (Anley, 2002). Similarly,
XSS in HTML/JavaScript allows loading expected
codes remotely into the edge server (victim) as the
victim does not verify XSS codes (Martin & Lam,
2008). On the other hand, in 2), as edge servers are
interconnected and would work collaboratively with
each other, they would exchange data for processing.
If an edge server (victim) is spooled to listen to a
compromised edge server (attacker), the victim will
execute malicious codes from the attacker. XML
signature wrapping is commonly used when
launching the attack (McIntosh & Austel, 2005).
Nevertheless, ransomware attack is not detectable
immediately when it is taking place in an edge server.
In case of being attacked, the IoT system would face
the data integrity and data accuracy problems, which
may not cause significant harm to them. However, the
problems for data-oriented IoT systems (Tse et al,
2018) (Tse & Pau, 2016) (Aguiari et al, 2018) may
affect the quality of critical decision the systems
make. Thus, a self-recovery function against
ransomware attack should be enabled in edge servers.
In the next section, we present the Self-recovery
service (SRS), which secures edge servers against
ransomware attack.
3 SELF-RECOVERY SERVICE
In this paper, the Self-recovery service (SRS) is
proposed to ease the damage caused to an edge server
by ransomware. SRS is a system service that runs at
the kernel level, monitoring the activity of the file