@article{14147257512017, author = "Gom{\'e}z Hern{\'a}ndez, Jos{\'e} Antonio and L. {\'A}lvarez-Gonz{\'a}lez and Garc{\'i}a-Teodoro, Pedro ", abstract = "Ransomware has become a pandemic nowadays. Although some proposals exist to fight against this increasing type of extorsion, most of them are prevention like and rely on the assumption that early detection is not so effective once the victim is infected. This paper presents a novel approach intended not just to early detect ransomware but to completly thwart its action. For that, a set of honeyfiles are deployed around the target environment in order to catch the ransomware. Instead of being normal archives, honeyfiles are FIFO like, so that the ransomware is blocked once it starts reading the file. In addition to frustrate its action, our honeyfile solution is able to automatically launch countermeasures to solve the infection. Moreover, as it does not require previous training or knowledge, the approach allows fighting against unknown, zero-day ransomware related attacks. As a proof of concept, we have developed the approach for Linux platforms. The tool, named R-Locker, shows excellent performance both from the perspective of its accuracy as well as in terms of complexity and resource consumption. In addition, it has no special needs or privileges and does not affect the normal operation of the overall environment.", doi = "https://doi.org/10.1016/j.cose.2017.11.019", journal = "Computer {\&} Security", month = "March", pages = "389-398", title = "{R}-{L}ocker: thwarting ransomware action through a honeyfile-based approach", url = "https://doi.org/10.1016/j.cose.2017.11.019", volume = "73", year = "2017", }