Repository logo
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks
 
  • Details

Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks

Source
Proceedings - IEEE International Symposium on Circuits and Systems
Author(s)
T., Sharma, Tarun
K., Patni, Khushi
Z., Li, Zhida
L., Trajkovic, Ljiljana
DOI
10.1109/ISCAS46773.2023.10182056
Volume
2023-May
Abstract
With the advancement of technology over the last decade, there has been a rapid increase in the number and types of malware attacks such as worms whose primary function is to self-replicate and infect systems and ransomware that corrupts and encrypts data. Developing proactive cyber defense techniques is essential for effectively detecting network anomalies that are evolving and becoming more challenging to identify. In this paper, we consider intrusion detection techniques using fast machine learning algorithms. We investigate Echo and Deep Echo State Networks machine learning structures for detecting worm and ransomware anomalies. We demonstrate, analyze, and compare merits of this approach using Slammer worm, WannaCrypt ransomware, and WestRock ransomware attack datasets. � 2023 Elsevier B.V., All rights reserved.
Unpaywall
URI
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85167663727&doi=10.1109%2FISCAS46773.2023.10182056&partnerID=40&md5=e223145d364fd69a4bf84f3860020352
https://d8.irins.org/handle/IITG2025/29394
Keywords
Anomaly detection
Cybersecurity
Deep neural networks
Intrusion detection
Learning algorithms
Malware
Network security
Cyber security
Cyber-defense
Defense techniques
Echo state networks
Internet worm
Malware attacks
Network anomalies
Primary functions
Reservoir Computing
Recurrent neural networks
IITGN Knowledge Repository Developed and Managed by Library

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify