{"id":2781,"date":"2018-07-01T20:54:35","date_gmt":"2018-07-01T18:54:35","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=2781"},"modified":"2024-10-31T13:16:20","modified_gmt":"2024-10-31T12:16:20","slug":"behavioralne-aspekty-vybranych-casti-ransomware","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2018\/07\/01\/behavioralne-aspekty-vybranych-casti-ransomware\/","title":{"rendered":"Behavior\u00e1lne aspekty vybran\u00fdch \u010dast\u00ed ransomware"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2781\" class=\"elementor elementor-2781\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e108e7 e-flex e-con-boxed e-con e-child\" data-id=\"6e108e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-749fbad elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"749fbad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_749fbad * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_749fbad{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_749fbad:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_749fbad .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_749fbad span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_749fbad:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_749fbad .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box\" id=\"uc_square_icon_box_elementor_749fbad\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/10\/D7DB4512491D4016A9E5F55F6DEC15CC.pdf\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tPr\u00e1ca\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Autor: <\/strong>Bc. J\u00falia K\u00e1zsm\u00e9rov\u00e1<br \/><strong>\u0160kolite\u013e: <\/strong>doc. RNDr. JUDr. Pavol Sokol, PhD.<br \/><strong>Konzultant: <\/strong>Mgr. Ladislav Ba\u010do<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstrakt<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jednou z top 15 hrozieb pod\u013ea ENISA Threat Landscape je ransomv\u00e9r. Ransomv\u00e9r m\u00f4\u017ee ma\u0165 obrovsk\u00fd negat\u00edvny dopad pre \u013eud\u00ed aj organiz\u00e1cie. Pr\u00edkladom je pou\u017eitie ransomv\u00e9ru WannaCry, ktor\u00fd v m\u00e1ji 2017 sp\u00f4sobil ohromenie syst\u00e9mov vo viac ako 150 krajin\u00e1ch a ktor\u00fd ohrozil zdravotn\u00edcke syst\u00e9my v Anglicku alebo na Slovensku. V r\u00e1mci tejto pr\u00e1ce sa venujeme identifik\u00e1cii r\u00f4znych typov ransomv\u00e9ru pomocou ich behavior\u00e1lnych znakov (napr. sp\u00f4sobu komunik\u00e1cie, \u0161ifrovania s\u00faborov a pod.). Na z\u00edskanie vlastnost\u00ed ransomv\u00e9rov vyu\u017e\u00edvame syst\u00e9m na statick\u00fa a behavior\u00e1lnu anal\u00fdzu malv\u00e9ru \u2013 Cuckoo Sandbox. N\u00e1sledne sme analyzovali v\u00fdsledky zo syst\u00e9mu a pomocou triediaceho algoritmu ich del\u00edme do tried. S\u00fa\u010das\u0165ou tejto pr\u00e1ce je aj n\u00e1vod na konfigur\u00e1ciu dom\u00e1ceho laborat\u00f3ria Cuckoo syst\u00e9mu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39a89a elementor-widget elementor-widget-heading\" data-id=\"e39a89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ciele<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05fb267 elementor-widget elementor-widget-text-editor\" data-id=\"05fb267\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span dir=\"ltr\" style=\"left: 24.78%;top: 37.19%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Analyzova\u0165 ransomware a jeho zn\u00e1me typy<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.78%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Porovna\u0165 jednotliv\u00e9 pr\u00edstupy k anal\u00fdze ransomware<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.78%;top: 40.61%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Navrhn\u00fa\u0165 a porovna\u0165 met\u00f3dy detekcie a obrany vo\u010di ransomware<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89aa96b elementor-widget elementor-widget-heading\" data-id=\"89aa96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Literat\u00fara<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d149794 elementor-widget elementor-widget-text-editor\" data-id=\"d149794\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span dir=\"ltr\" style=\"left: 28.66%;top: 43%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">OKTAVIANTO,<\/span> <span dir=\"ltr\" style=\"left: 43.56%;top: 43%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Digit;<\/span> <span dir=\"ltr\" style=\"left: 49.78%;top: 43%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">MUHARDIANTO,<\/span> <span dir=\"ltr\" style=\"left: 67%;top: 43%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Iqbal.<\/span> <span dir=\"ltr\" style=\"left: 73.17%;top: 43%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Cuckoo<\/span> <span dir=\"ltr\" style=\"left: 80.96%;top: 43%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Malware <\/span><span dir=\"ltr\" style=\"left: 24.78%;top: 44.71%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Analysis. Packt Publishing Ltd, 2013.<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.78%;top: 46.42%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">SIKORSKI, Michael; HONIG, Andrew. Practical malware analysis: the <\/span><span dir=\"ltr\" style=\"left: 24.78%;top: 48.13%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">hands-on guide to dissecting malicious software. no starch press, 2012.<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.78%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">MARAK, Victor. Windows Malware Analysis Essentials. Packt Publishing <\/span><span dir=\"ltr\" style=\"left: 24.78%;top: 51.55%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Ltd, 2015.<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.78%;top: 53.26%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">LIGH, Michael, et al. Malware analyst&#8217;s cookbook and DVD: tools and<\/span><span dir=\"ltr\" style=\"left: 24.78%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\"> techniques for fighting malicious code. Wiley Publishing, 2010.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a432df6 elementor-widget elementor-widget-heading\" data-id=\"a432df6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Priebeh pr\u00e1ce<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f13991a elementor-widget elementor-widget-text-editor\" data-id=\"f13991a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zatia\u013e nezverejnen\u00e9<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Autor: Bc. J\u00falia K\u00e1zsm\u00e9rov\u00e1<br \/>\n\u0160kolite\u013e: doc. RNDr. JUDr. Pavol Sokol, PhD.<br \/>\nKonzultant: Mgr. Ladislav Ba\u010do<\/p>","protected":false},"author":8,"featured_media":2397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2781","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bakalarske-prace","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=2781"}],"version-history":[{"count":14,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2781\/revisions"}],"predecessor-version":[{"id":3395,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2781\/revisions\/3395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/2397"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=2781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=2781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=2781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}