Deciphering Ransomware: Strategic API Usage and Behavioral Patterns for Advanced Detection Techniques
DOI:
https://doi.org/10.3991/ijim.v19i10.49245Keywords:
Ransomware Detection, Behavioral Analysis, Dataset, AI-based Detection, API Call Patterns, Cuckoo Sandbox, CybersecurityAbstract
Ransomware has emerged as a critical cybersecurity threat, inflicting severe financial and operational damage across industries. Traditional signature-based detection systems struggle to detect zero-day and evolving ransomware strains, as they rely on known signatures that cannot capture new tactics. In contrast, behavioral detection methods analyze ransomware actions and patterns, making them more effective. Integrating artificial intelligence (AI) can further improve detection rates; however, effective AI models require diverse, up-to-date, and representative data. Previous research has often focused on isolated aspects of ransomware behavior. Our study addresses these gaps by providing a publicly accessible, up-to-date dataset covering multiple ransomware variants and families, including polymorphic and obfuscated strains not comprehensively explored in prior literature. Additionally, our approach identifies extensive ransomware metrics, including network interactions, registry modifications, file system changes, and low-level API call patterns, enabling real-time detection of malicious activities. Through a comprehensive behavior-based analysis of over 200 recent ransomware samples using the Cuckoo Sandbox platform and custom Python scripts, our study provides cybersecurity practitioners with valuable data and actionable insights, supporting faster responses, improved threat detection, and a proactive stance against evolving risks.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Khalid ZIRARI, Hamza Kamal Idrissi, Ahmed El-Yahyaoui, Hicham Bensaid, Abdeslam En-Nouaary

This work is licensed under a Creative Commons Attribution 4.0 International License.

