An Accurate Ransomware Detection Framework Based on Monitoring The Interaction of Ransomware Attacks with Infected Systems

Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

One of the most dangerous cyberattacks targeting users’ files on electronic devices is the Ransomware attack. Ransomware attacks can be divided into crypto ransomware and locker ransomware. Crypto ransomware is the most prevalent one, and works by encrypting users’ files and data, resulting in files becoming useless. Locker ransomware does not encrypt data itself but denies users access to their devices by locking the device or preventing logging on, and files therefore become unreachable. After encrypting files or locking devices, victims’ are asked to pay ransom in order to restore their data. However, the problem with ransomware attacks is that there is no guarantee for the victims that the data will be restored; they can end up paying the ransom and still lose the data. The losses resulting from this attack can be very large, especially if it targets large organisations and companies. This work targeted crypto-ransomware attacks and aimed to find the differences between ransomware attacks and benign programs that share the same behaviour, in terms of file system activities and I/O traces and, in addition, to find indicators to detect ransomware attacks in their early stages with minimal cost, and to propose a framework to obtain a high true positive rate and a low false positive rate accurately. An accurate framework for detecting ransomware attacks in its early stages with minimal cost and no data loss is presented in this work. The framework was based on analysing ransomware attacks using the Cuckoo sandbox to create a safe and isolated environment, and the Process Monitor tool to observe ransomware samples in terms of system file activities and I/O traces. The analysis showed that, although ransomware attacks from different families and their variations have technical differences, they all shared the same I/O access pattern of behaviour for encrypting victims files. The proposed framework accurately obtained a high true positive rate of 96.5% and a low false positive rate of 0%, with 98.25% accuracy, and an error rate of 1.75%, by using Shannon Entropy as an indicator for ransomware attacks.

Description

Keywords

Citation

Endorsement

Review

Supplemented By

Referenced By

Copyright owned by the Saudi Digital Library (SDL) © 2025