ARCHIVES

Original Article

Ransomware Threat Detection and Automated Response System Using Wazuh and Python

Mohan S1 Pradeep G2 Madhuravel P3 Deepakumaar R4 J. Dhivya5
1 2 3 4 Department of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore, Tamil Nadu, India. 5 Assistant Professor, United Institute of Technology, Coimbatore, Tamil Nadu, India.

Published Online: May-August 2026

Pages: 270-275

Abstract

The increasing evolution of ransomware attacks has created significant challenges for traditional cybersecurity systems that rely primarily on signature-based detection and manual incident response mechanisms. According to the National Institute of Standards and Technology (NIST) Special Publication 1800-26, maintaining data integrity through timely detection and response is critical for minimizing organizational downtime and preventing data corruption caused by ransomware and other destructive events. Inspired by the NIST data integrity and ransomware response framework, this paper presents an intelligent and automated Ransomware Threat Detection and Response System designed to identify ransomware behaviour in real time and minimize data loss through rapid containment actions. The proposed framework integrates Wazuh for continuous system monitoring, behavioural analysis, log correlation, and threat detection with Python-based automated response mechanisms. The system continuously monitors critical indicators such as abnormal file modifications, suspicious process execution, unusual CPU and memory utilization, and shadow copy deletion attempts. Upon detecting ransomware-like activity, automated response actions including malicious process termination, network isolation, alert generation, and system containment are executed instantly to prevent further encryption and propagation. The framework is deployed in a virtualized environment consisting of Ubuntu Server, Windows client systems, and Kali Linux attack simulation machines to evaluate real-world attack scenarios safely. Experimental results demonstrate that the proposed behaviour-based approach effectively detects ransomware activity at early stages with faster response times and reduced system impact compared to conventional reactive security solutions. The proposed system offers a scalable, lightweight, and cost-effective cybersecurity solution suitable for academic, enterprise, and small-scale organizational environments.

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20260502031

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.