Author
Listed:
- Xiang Fang
(Department of Electrical Engineering, City University of New York, City College, New York, NY 10031, USA)
- Eric Song
(Yorktown High School, Yorktown Heights, NY 10598, USA)
- Cheng Ning
(Department of Computer Science, City University of New York, Graduate Center, New York, NY 10016, USA)
- Huseyn Huseynov
(Department of Electrical Engineering, City University of New York, City College, New York, NY 10031, USA)
- Tarek Saadawi
(Department of Electrical Engineering, City University of New York, City College, New York, NY 10031, USA)
Abstract
Ransomware is a group of malware that aims to make computing resources unavailable, demanding a ransom amount to return control back to users. Ransomware can be classified into two types: crypto-ransomware and locker ransomware. Crypto-ransomware employs strong encryption and prevents users’ access to the system. Locker ransomware makes access unavailable to users either by locking the boot sector or the user’s desktop. The proposed solution is an anomaly-based ransomware detection and prevention system consisting of post- and pre-encryption detection stages. The developed IDS is capable of detecting ransomware attacks by monitoring the usage of resources, triggered by anomalous behavior during an active attack. By analyzing the recorded parameters after recovery and logging any adverse effects, we were able to train the system for better detection patterns. The proposed solution allows for detection and intervention against the crypto and locker types of ransomware attacks. In previous work, the authors introduced a novel anti-ransomware tool for Windows platforms, known as R-Locker, which demonstrates high effectiveness and efficiency in countering ransomware attacks. The R-Locker solution employs “honeyfiles”, which serve as decoy files to attract ransomware activities. Upon the detection of any malicious attempts to access or alter these honeyfiles, R-Locker automatically activates countermeasures to thwart the ransomware infection and mitigate its impact. Building on our prior R-Locker framework this work introduces a multi-stage detection architecture with resource–behavioral hybrid analysis, achieving cross-platform efficacy against evolving ransomware families not addressed previously.
Suggested Citation
Xiang Fang & Eric Song & Cheng Ning & Huseyn Huseynov & Tarek Saadawi, 2025.
"Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker,"
Mathematics, MDPI, vol. 13(12), pages 1-25, June.
Handle:
RePEc:gam:jmathe:v:13:y:2025:i:12:p:1933-:d:1675914
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:13:y:2025:i:12:p:1933-:d:1675914. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.