2023
DOI: 10.1109/mcom.001.2200215
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Detecting the WestRock Ransomware Attack Using BGP Routing Records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…However, it is crucial to recognise that the encryption of packets may hinder the effectiveness of this approach. Li et al [119] identify anomalies in the Border Gateway Protocol (BGP) logs obtained during the WestRock ransomware attack, signalling the presence of ransomware activity. BGP is a path-vector routing protocol crucial for determining optimal routes for data packets between different networks.…”
Section: B: Network Featuresmentioning
confidence: 99%
“…However, it is crucial to recognise that the encryption of packets may hinder the effectiveness of this approach. Li et al [119] identify anomalies in the Border Gateway Protocol (BGP) logs obtained during the WestRock ransomware attack, signalling the presence of ransomware activity. BGP is a path-vector routing protocol crucial for determining optimal routes for data packets between different networks.…”
Section: B: Network Featuresmentioning
confidence: 99%
“…In order to improve the performance of their model, a transfer learning mechanism was employed. In their dissertation, Li et al [83] proposed new algorithms, based on Broad Learning System, both with and without incremental learning, to classify ransomware and other types of attacks. The authors used a number of machine learning models to detect the malicious behavior of network users.…”
Section: C: Other Platformsmentioning
confidence: 99%
“…Advanced ransomware variants are capable of manipulating file metadata in such a way that they masquerade as benign entities, effectively bypassing traditional static analysis [39,54]. This obfuscation can take various forms, including the strategic alteration of file extensions, the adjustment of file sizes to common document formats, and the manipulation of entropy levels to mimic non-encrypted files [52,55]. It has been observed that even when machine learning is applied to the analysis of metadata, there is a significant challenge in adapting to the continuous evolution of ransomware [9,29].…”
Section: File Metadata Analysismentioning
confidence: 99%
“…Despite this, the challenge of interpreting such data at a high level remains formidable [2,25,41]. Ransomware, with its ever-increasing sophistication, has been known to employ a variety of obfuscation techniques to cloak its activity, thereby eluding detection methods that are reliant on system call patterns [29,54,55].…”
Section: System Call Analysismentioning
confidence: 99%
See 1 more Smart Citation