Score: 0

Intermittent File Encryption in Ransomware: Measurement, Modeling, and Detection

Published: October 16, 2025 | arXiv ID: 2510.15133v1

By: Ynes Ineza , Gerald Jackson , Prince Niyonkuru and more

Potential Business Impact:

Finds hidden computer viruses that only attack parts of files.

Business Areas:
Intrusion Detection Information Technology, Privacy and Security

File encrypting ransomware increasingly employs intermittent encryption techniques, encrypting only parts of files to evade classical detection methods. These strategies, exemplified by ransomware families like BlackCat, complicate file structure based detection techniques due to diverse file formats exhibiting varying traits under partial encryption. This paper provides a systematic empirical characterization of byte level statistics under intermittent encryption across common file types, establishing a comprehensive baseline of how partial encryption impacts data structure. We specialize a classical KL divergence upper bound on a tailored mixture model of intermittent encryption, yielding filetype specific detectability ceilings for histogram-based detectors. Leveraging insights from this analysis, we empirically evaluate convolutional neural network (CNN) based detection methods using realistic intermittent encryption configurations derived from leading ransomware variants. Our findings demonstrate that localized analysis via chunk level CNNs consistently outperforms global analysis methods, highlighting their practical effectiveness and establishing a robust baseline for future detection systems.

Country of Origin
🇺🇸 United States

Page Count
17 pages

Category
Computer Science:
Cryptography and Security