{"id":6849,"date":"2019-09-09T09:46:00","date_gmt":"2019-09-09T09:46:00","guid":{"rendered":"https:\/\/www.ikusi.com\/parameters-for-ransomware-attack-detection\/"},"modified":"2019-09-09T09:46:00","modified_gmt":"2019-09-09T09:46:00","slug":"parameters-for-ransomware-attack-detection","status":"publish","type":"post","link":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/","title":{"rendered":"Parameters for ransomware attack detection"},"content":{"rendered":"\n<p>The number of private users and companies affected by ransomware attacks has increased considerably over the recent years. The creation of new business models based on the \u201cInternet of Things\u201d, cloud services, e-banking, together with the anonymity of cryptocurrency transactions have caused the design of new attacks.<\/p>\n\n\n\n<p>The attackers have created new<em> malwares<\/em> that cause alarming damages, both financially and in the corporate image of companies. Therefore, ransomware has become one of <em>the most dangerous attac<\/em>ks able to cause huge losses around the world.<\/p>\n\n\n\n<p>According to a report by <strong>Symantec<\/strong>, the number of ransomware attacks increased by <em>113%<\/em>. They are considered a threat from the internet core. The attacks are also addressed to large organizations, such as hospitals, educational or banking entities.<\/p>\n\n\n\n<p>Timely detection of a ransomware attack is one of the <strong>main goals<\/strong> in the field of \u200b\u200bcybersecurity development, because once the attack has been carried out, information retrieval becomes very difficult. That\u2019s why we try to find parameters that allow detecting an attack in its early stages (before data encryption).<\/p>\n\n\n\n<p>In order to prevent such attacks, proposals focused on recommendations, such as making backups or updating the operating system, have been developed. There are also strategies that propose different mechanisms for the prevention of loss of information like the creation of a secured repository or deployment of computer security tools.<\/p>\n\n\n\n<p>For example, in some strategic methods API calls have been analyzed through data mining algorithms, such as Random Forest or Support Vector Machine, which includes the extraction and selection of features, information processing, and the analysis of results through learning algorithms.<br>In other cases, a dynamic classification method has been proposed to detect the type of ransomware to which the attack belongs, which evaluate characteristics such as APIs, monitoring of file system operations, directories and records, among others.<\/p>\n\n\n\n<p>One of the most prominent solutions proposed is the analysis of metrics and statistics of the system or network that allows to detect known patterns and, if possible, predict a future attack.<\/p>\n\n\n\n<p>Some patterns could help to counteract possible attacks and develop a recovery plan, however, it is important to clarify that due to the large number of threats and the characteristics of each type of attack, there is no ideal learning model for ransomware detection. However, the focus has been on the selection of algorithms that allow identifying as suspicious the attributes\u2019 behavior that can be monitored.<\/p>\n\n\n\n<p>For the future we expect the improvement of algorithms that allow detecting, with a greater success rate, if an application is executing malicious ransomware tasks relating parameters of different nature such as created files, network traffic, remote connections or modifications in the registry of the system.<\/p>\n\n\n\n<p>Ikusi\u2019s <a href=\"https:\/\/www.ikusiredes.com\/en\/soluciones\/wasp-end-user-security\/\">cybersecurity<\/a> solutions protect your company&#8217;s critical infrastructure by threat detection service which covers the entire cycle of an attack from threat analysis for timely containment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The number of private users and companies affected by ransomware attacks has increased considerably over the recent years. The creation [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":20735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[300],"tags":[],"temas":[303],"class_list":["post-6849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","temas-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Parameters for ransomware attack detection - Ikusi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Parameters for ransomware attack detection - Ikusi\" \/>\n<meta property=\"og:description\" content=\"The number of private users and companies affected by ransomware attacks has increased considerably over the recent years. The creation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IkusiVelatia\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-09T09:46:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ikusi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:site\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ikusi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/\"},\"author\":{\"name\":\"Ikusi\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a\"},\"headline\":\"Parameters for ransomware attack detection\",\"datePublished\":\"2019-09-09T09:46:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/\"},\"wordCount\":477,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/\",\"url\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/\",\"name\":\"Parameters for ransomware attack detection - Ikusi\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg\",\"datePublished\":\"2019-09-09T09:46:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.ikusi.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Parameters for ransomware attack detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"name\":\"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikusi.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\",\"name\":\"Ikusi\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"width\":1,\"height\":1,\"caption\":\"Ikusi\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IkusiVelatia\",\"https:\/\/x.com\/ikusi_espana\",\"https:\/\/www.instagram.com\/ikusi.velatia\/\",\"https:\/\/www.linkedin.com\/company\/ikusi\/\",\"https:\/\/www.youtube.com\/user\/IkusiGroup\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a\",\"name\":\"Ikusi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Ikusi\"},\"url\":\"https:\/\/www.ikusi.com\/en\/author\/ikusi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Parameters for ransomware attack detection - Ikusi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/","og_locale":"en_US","og_type":"article","og_title":"Parameters for ransomware attack detection - Ikusi","og_description":"The number of private users and companies affected by ransomware attacks has increased considerably over the recent years. The creation [&hellip;]","og_url":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/","og_site_name":"Ikusi","article_publisher":"https:\/\/www.facebook.com\/IkusiVelatia","article_published_time":"2019-09-09T09:46:00+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg","type":"image\/jpeg"}],"author":"Ikusi","twitter_card":"summary_large_image","twitter_creator":"@ikusi_espana","twitter_site":"@ikusi_espana","twitter_misc":{"Written by":"Ikusi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#article","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/"},"author":{"name":"Ikusi","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a"},"headline":"Parameters for ransomware attack detection","datePublished":"2019-09-09T09:46:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/"},"wordCount":477,"commentCount":0,"publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/","url":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/","name":"Parameters for ransomware attack detection - Ikusi","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg","datePublished":"2019-09-09T09:46:00+00:00","breadcrumb":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#primaryimage","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/parametros-para-la-deteccion-2.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikusi.com\/en\/blog\/parameters-for-ransomware-attack-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ikusi.com\/en\/"},{"@type":"ListItem","position":2,"name":"Parameters for ransomware attack detection"}]},{"@type":"WebSite","@id":"https:\/\/www.ikusi.com\/en\/#website","url":"https:\/\/www.ikusi.com\/en\/","name":"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad","description":"","publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikusi.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikusi.com\/en\/#organization","name":"Ikusi","url":"https:\/\/www.ikusi.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","width":1,"height":1,"caption":"Ikusi"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IkusiVelatia","https:\/\/x.com\/ikusi_espana","https:\/\/www.instagram.com\/ikusi.velatia\/","https:\/\/www.linkedin.com\/company\/ikusi\/","https:\/\/www.youtube.com\/user\/IkusiGroup"]},{"@type":"Person","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a","name":"Ikusi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Ikusi"},"url":"https:\/\/www.ikusi.com\/en\/author\/ikusi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/6849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/comments?post=6849"}],"version-history":[{"count":0,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/6849\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media\/20735"}],"wp:attachment":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media?parent=6849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/categories?post=6849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/tags?post=6849"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/temas?post=6849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}