Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

[HTML][HTML] A survey of advanced border gateway protocol attack detection techniques

BA Scott, MN Johnstone… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
The Internet's default inter-domain routing system, the Border Gateway Protocol (BGP),
remains insecure. Detection techniques are dominated by approaches that involve large …

Machine learning for detecting the WestRock ransomware attack using BGP routing records

Z Li, ALG Rios, L Trajković - IEEE Communications Magazine, 2022 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) enables Internet data routing. Hence, its anomalies affect
Internet connectivity and cause routing discon-nections, route flaps, and oscillations …

Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization

E Muhati, D Rawat - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
The exponential growth in data volumes, combined with the inherent complexity of network
algorithms, has drastically affected network security. Data activities are producing …

[HTML][HTML] Matrix Profile data mining for BGP anomaly detection

BA Scott, MN Johnstone, P Szewczyk, S Richardson - Computer Networks, 2024 - Elsevier
Abstract The Border Gateway Protocol (BGP), acting as the communication protocol that
binds the Internet, remains vulnerable despite Internet security advancements. This is not …

[HTML][HTML] BGP anomaly detection as a group dynamics problem

BA Scott, MN Johnstone, P Szewczyk, S Richardson - Computer Networks, 2025 - Elsevier
Understanding group information and collective behaviors is an ongoing area of research,
encompassing natural phenomena and human dynamics. Quantifying interactions and …

Identifying and classifying cyberattacks on airports

L Florido-Benítez - Cyber Security: A Peer-Reviewed Journal, 2024 - ingentaconnect.com
This paper describes research to identify and classify cyberattacks in the aviation industry in
order to present the true reality of airports as a critical infrastructure and the threats that …

Deep echo state networks for detecting internet worm and ransomware attacks

T Sharma, K Patni, Z Li… - 2023 IEEE international …, 2023 - ieeexplore.ieee.org
With the advancement of technology over the last decade, there has been a rapid increase
in the number and types of malware attacks such as worms whose primary function is to self …

Internet routing anomaly detection using LSTM based autoencoder

AH Muosa, AH Ali - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The internet is formed by thousands of interconnected Autonomous Systems (ASes). The
Border Gateway Protocol (BGP) exchanges routing information between autonomous …

[HTML][HTML] A comprehensive literature review on ransomware detection using deep learning

E Kritika - Cyber Security and Applications, 2024 - Elsevier
The manifold rise in ransomware attacks noted highest in 2023 posing a serious trepidation
for cyber professionals to be active watchdogs of the early detection techniques …