Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,584)

Search Parameters:
Keywords = cyber-security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 1331 KiB  
Article
Hybrid Neural Network-Based Intrusion Detection System: Leveraging LightGBM and MobileNetV2 for IoT Security
by Yi-Min Yang, Ko-Chin Chang and Jia-Ning Luo
Symmetry 2025, 17(3), 314; https://doi.org/10.3390/sym17030314 (registering DOI) - 20 Feb 2025
Abstract
The rapid expansion of the Internet of Things (IoT) has uncovered a significant asymmetry in cybersecurity, where low-power edge devices must face sophisticated threats from adversaries backed by ample resources. In our study, we employ a symmetry-based approach to rebalance these uneven scenarios. [...] Read more.
The rapid expansion of the Internet of Things (IoT) has uncovered a significant asymmetry in cybersecurity, where low-power edge devices must face sophisticated threats from adversaries backed by ample resources. In our study, we employ a symmetry-based approach to rebalance these uneven scenarios. We propose a Hybrid Neural Network Intrusion Detection System (Hybrid NNIDS) that uses LightGBM to filter anomalies at the traffic level and MobileNetV2 for further detection at the packet level, creating a viable compromise between detection accuracy and computational cost. Additionally, the proposed Hybrid NNIDS model, on the ACI-IoT-2023 dataset, outperformed other intrusion detection models with an accuracy of 94%, an F1-score of 91%, and a precision rate of 93% in attack detection. The results indicate the developed asymmetry algorithm can greatly reduce processing overhead while still being able to be implemented in IoT environments. The focus of future work will be on the real-world deployment of these security infrastructures in the IoT and their adaptation to newer types of attack vectors that may be developed by malware. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Cyber Security, IoTs and Privacy)
Show Figures

Figure 1

Figure 1
<p>EER-based threshold determination with LightGBM.</p>
Full article ">Figure 2
<p>Confusion matrix for LightGBM model.</p>
Full article ">Figure 3
<p>Confusion matrix for MobileNetV2 model.</p>
Full article ">Figure 4
<p>Hybrid inference confusion matrix.</p>
Full article ">
20 pages, 613 KiB  
Article
Max-Min Secrecy Rate for UAV-Assisted Energy Harvesting IoT Networks
by Mingrui Zheng, Tianrui Feng and Tengjiao He
Information 2025, 16(2), 158; https://doi.org/10.3390/info16020158 - 19 Feb 2025
Abstract
The future Internet of Things (IoT) will consist of energy harvesting devices and Unmanned Aerial Vehicles (UAVs) to support applications in remote areas. However, as UAVs communicate with IoT devices using broadcast channels, information leakage emerges as a critical security threat. This paper [...] Read more.
The future Internet of Things (IoT) will consist of energy harvesting devices and Unmanned Aerial Vehicles (UAVs) to support applications in remote areas. However, as UAVs communicate with IoT devices using broadcast channels, information leakage emerges as a critical security threat. This paper considers the problem of maximizing the minimum secrecy rate in an energy harvesting IoT network supported by two UAVs, where one acts as a server to collect data from devices, and the other is an eavesdropper to intercept data transmission. It presents a novel Mixed-Integer Nonlinear Program (MINLP), which we then linearize into a Mixed-Integer Linear Program (MILP) problem. It also proposes a heuristic solution called Fly Nearest Location (FNL). Both solutions determine (i) the UAV server’s flight routing, flight time, and computation time, as well as (ii) the energy usage and operation mode of IoT devices. Our results show that FNL achieves on average 78.15% of MILP’s performance. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>An example UAV-assisted IoT network with solar-powered devices. The hovering locations of UAV-S are labeled as A, B, and C. The red dotted line indicates a possible trajectory for UAV-S, and the green dotted lines indicate jamming transmissions. Blue solid lines represent data transmissions.</p>
Full article ">Figure 2
<p>Frame structure: each frame includes a <span class="html-italic">flight</span> slot and a <span class="html-italic">data</span> slot.</p>
Full article ">Figure 3
<p>Impact of number of locations <math display="inline"><semantics> <mrow> <mo>|</mo> <mi mathvariant="script">M</mi> <mo>|</mo> </mrow> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 4
<p>Impact of number of devices <math display="inline"><semantics> <mrow> <mo>|</mo> <mi mathvariant="script">V</mi> <mo>|</mo> </mrow> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 5
<p>Impact of number of locations <math display="inline"><semantics> <mrow> <mo>|</mo> <mi mathvariant="script">T</mi> <mo>|</mo> </mrow> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 6
<p>Impact of transmit power of devices <math display="inline"><semantics> <msub> <mi>P</mi> <mn>0</mn> </msub> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 7
<p>Impact of network bandwidth <span class="html-italic">W</span> on max-min secrecy rate.</p>
Full article ">Figure 8
<p>Impact of energy harvesting efficiency on max-min secrecy rate.</p>
Full article ">
18 pages, 33036 KiB  
Article
Three-Dimensional Magnetotelluric Forward Modeling Using Multi-Task Deep Learning with Branch Point Selection
by Fei Deng, Hongyu Shi, Peifan Jiang and Xuben Wang
Remote Sens. 2025, 17(4), 713; https://doi.org/10.3390/rs17040713 - 19 Feb 2025
Abstract
Magnetotelluric (MT) forward modeling is a key technique in magnetotelluric sounding, and deep learning has been widely applied to MT forward modeling. In three-dimensional (3-D) problems, although existing methods can predict forward modeling results with high accuracy, they often use multiple networks to [...] Read more.
Magnetotelluric (MT) forward modeling is a key technique in magnetotelluric sounding, and deep learning has been widely applied to MT forward modeling. In three-dimensional (3-D) problems, although existing methods can predict forward modeling results with high accuracy, they often use multiple networks to simulate multiple forward modeling parameters, resulting in low efficiency. We apply multi-task learning (MTL) to 3-D MT forward modeling to achieve simultaneous inference of apparent resistivity and impedance phase, effectively improving overall efficiency. Furthermore, through comparative analysis of feature map differences in various decoder layers of the network, we identify the optimal branching point for multi-task learning decoders. This enhances the feature extraction capabilities of the network and improves the prediction accuracy of forward modeling parameters. Additionally, we introduce an uncertainty-based loss function to dynamically balance the learning weights between tasks, addressing the shortcomings of traditional loss functions. Experiments demonstrate that compared with single-task networks and existing multi-task networks, the proposed network (MT-FeatureNet) achieves the best results in terms of Structural Similarity Index Measure (SSIM), Mean Relative Error (MRE), and Mean Absolute Error (MAE). The proposed multi-task learning model not only improves the efficiency and accuracy of 3-D MT forward modeling but also provides a novel approach to the design of multi-task learning network structures. Full article
Show Figures

Figure 1

Figure 1
<p>Comparison between (<b>a</b>) single-task networks and (<b>b</b>) multi-task networks.</p>
Full article ">Figure 2
<p>U-Net single-task network model.</p>
Full article ">Figure 3
<p>U-Net single-task network model.</p>
Full article ">Figure 4
<p>Feature map of layer (<b>a</b>) A and (<b>b</b>) B and (<b>c</b>) C.</p>
Full article ">Figure 5
<p>Loss per Epoch Comparison.</p>
Full article ">Figure 6
<p>Comparison of single anomaly results.</p>
Full article ">Figure 7
<p>Comparison of the results of the two anomalies.</p>
Full article ">Figure 8
<p>Comparison of the results of the three anomalies.</p>
Full article ">Figure 9
<p>Loss per Epoch Comparison.</p>
Full article ">
25 pages, 2916 KiB  
Article
Improving Cyber Defense Against Ransomware: A Generative Adversarial Networks-Based Adversarial Training Approach for Long Short-Term Memory Network Classifier
by Ping Wang, Hsiao-Chung Lin, Jia-Hong Chen, Wen-Hui Lin and Hao-Cyuan Li
Electronics 2025, 14(4), 810; https://doi.org/10.3390/electronics14040810 - 19 Feb 2025
Abstract
The rapid proliferation of ransomware variants necessitates more effective detection mechanisms, as traditional signature-based methods are increasingly inadequate. These conventional methods rely on manual feature extraction and matching, which are time-consuming and limited to known threats. This study addresses the escalating challenge of [...] Read more.
The rapid proliferation of ransomware variants necessitates more effective detection mechanisms, as traditional signature-based methods are increasingly inadequate. These conventional methods rely on manual feature extraction and matching, which are time-consuming and limited to known threats. This study addresses the escalating challenge of ransomware threats in cybersecurity by proposing a novel deep learning model, LSTM-EDadver, which leverages Generative Adversarial Networks (GANs) and Carlini and Wagner (CW) attacks to enhance malware detection capabilities. LSTM-EDadver innovatively generates adversarial examples (AEs) using sequential features derived from ransomware behaviors, thus training deep learning models to improve their robustness and accuracy. The methodology combines Cuckoo sandbox analysis with conceptual lattice ontology to capture a wide range of ransomware families and their variants. This approach not only addresses the shortcomings of existing models but also simulates real-world adversarial conditions during the validation phase by subjecting the models to CW attacks. The experimental results demonstrate that LSTM-EDadver achieves a classification accuracy of 96.59%. This performance was achieved using a dataset of 1328 ransomware samples (across 32 ransomware families) and 519 normal instances, outperforming traditional RNN, LSTM, and GCU models, which recorded accuracies of 90.01%, 93.95%, and 94.53%, respectively. The proposed model also shows significant improvements in F1-score, ranging from 2.49% to 6.64% compared to existing models without adversarial training. This advancement underscores the effectiveness of integrating GAN-generated attack command sequences into model training. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

Figure 1
<p>The evolution of malware detection methods.</p>
Full article ">Figure 2
<p>Diagram of the developed malware classification model.</p>
Full article ">Figure 3
<p>The overall structure of the LSTM-ED<sub>adver</sub> model for ransomware detection.</p>
Full article ">Figure 4
<p>A deep learning model with auto-encoder structure for adversarial training.</p>
Full article ">Figure 5
<p>Subset Tree of Feature sets using the C4.5 algorithm.</p>
Full article ">Figure 6
<p>Concept lattice of 32 ransomware families.</p>
Full article ">Figure 7
<p>Classification accuracy.</p>
Full article ">Figure 8
<p>Loss value.</p>
Full article ">Figure 9
<p>Confusion matrix for LSTM-ED<sub>adver</sub>.</p>
Full article ">
26 pages, 3839 KiB  
Review
Smart Grid Fault Mitigation and Cybersecurity with Wide-Area Measurement Systems: A Review
by Chisom E. Ogbogu, Jesse Thornburg and Samuel O. Okozi
Energies 2025, 18(4), 994; https://doi.org/10.3390/en18040994 - 19 Feb 2025
Viewed by 146
Abstract
Smart grid reliability and efficiency are critical for uninterrupted service, especially amidst growing demand and network complexity. Wide-Area Measurement Systems (WAMS) are valuable tools for mitigating faults and reducing fault-clearing time while simultaneously prioritizing cybersecurity. This review looks at smart grid WAMS implementation [...] Read more.
Smart grid reliability and efficiency are critical for uninterrupted service, especially amidst growing demand and network complexity. Wide-Area Measurement Systems (WAMS) are valuable tools for mitigating faults and reducing fault-clearing time while simultaneously prioritizing cybersecurity. This review looks at smart grid WAMS implementation and its potential for cyber-physical power system (CPPS) development and compares it to traditional Supervisory Control and Data Acquisition (SCADA) infrastructure. While traditionally used in smart grids, SCADA has become insufficient in handling modern grid dynamics. WAMS differ through utilizing phasor measurement units (PMUs) to provide real-time monitoring and enhance situational awareness. This review explores PMU deployment models and their integration into existing grid infrastructure for CPPS and smart grid development. The review discusses PMU configurations that enable precise measurements across the grid for quicker, more accurate decisions. This study highlights models of PMU and WAMS deployment for conventional grids to convert them into smart grids in terms of the Smart Grid Architecture Model (SGAM). Examples from developing nations illustrate cybersecurity benefits in cyber-physical frameworks and improvements in grid stability and efficiency. Further incorporating machine learning, multi-level optimization, and predictive analytics can enhance WAMS capabilities by enabling advanced fault prediction, automated response, and multilayer cybersecurity. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic of a typical WAMS implementation [<a href="#B15-energies-18-00994" class="html-bibr">15</a>].</p>
Full article ">Figure 2
<p>A typical infinite-bus power grid model.</p>
Full article ">Figure 3
<p>Centralized wide-area measurement system (WAMS) architecture [<a href="#B46-energies-18-00994" class="html-bibr">46</a>].</p>
Full article ">Figure 4
<p>SGAM layers, zones, and domains [<a href="#B17-energies-18-00994" class="html-bibr">17</a>].</p>
Full article ">Figure 5
<p>Operationalization of PMU-based WAMS in infinite-bus grid model with communication system.</p>
Full article ">Figure 6
<p>(<b>a</b>) Block diagram of how WAMS integrates into physical power system through strategic PMU deployment to become CPPS. (<b>b</b>) Schematic of potential application in multi-energy system with wide-area network (WAN) and neighborhood-area network (NAN).</p>
Full article ">
28 pages, 432 KiB  
Article
A Dynamic Risk Assessment and Mitigation Model
by Pavlos Cheimonidis and Konstantinos Rantos
Appl. Sci. 2025, 15(4), 2171; https://doi.org/10.3390/app15042171 - 18 Feb 2025
Viewed by 172
Abstract
In the current operational landscape, organizations face a growing and diverse array of cybersecurity challenges, necessitating the development and implementation of innovative and effective security solutions. This paper presents a novel methodology for dynamic risk assessment and mitigation suggestions aimed at assessing and [...] Read more.
In the current operational landscape, organizations face a growing and diverse array of cybersecurity challenges, necessitating the development and implementation of innovative and effective security solutions. This paper presents a novel methodology for dynamic risk assessment and mitigation suggestions aimed at assessing and reducing cyber risks. The proposed approach gathers information from publicly available cybersecurity-related open sources and integrates it with environment-specific data to generate a comprehensive understanding of potential risks. It creates multiple distinct risk scenarios based on the identification of vulnerabilities, network topology, and the attacker’s perspective. The methodology employs Bayesian networks to proactively and dynamically estimate the probability of threats and Fuzzy Cognitive Maps to dynamically update vulnerability severity values for each risk scenario. These elements are combined with impact estimations to provide dynamic risk assessments. Furthermore, the methodology offers mitigation suggestions for each identified vulnerability across all risk scenarios, enabling organizations to effectively address the assessed cybersecurity risks. To validate the effectiveness of the proposed methodology, a case study is presented, demonstrating its practical application and efficacy. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed methodology flowchart.</p>
Full article ">Figure 2
<p>Multiple vulnerabilities—risk scenarios.</p>
Full article ">Figure 3
<p>Multiple pathways—risk scenarios.</p>
Full article ">Figure 4
<p>Experimental environment.</p>
Full article ">Figure 5
<p>FCM models.</p>
Full article ">Figure 6
<p>RS1: FCM Expert—results.</p>
Full article ">Figure 7
<p>Bayesian network structure.</p>
Full article ">Figure 8
<p>GeNIe results.</p>
Full article ">
22 pages, 3755 KiB  
Review
Railroad Cybersecurity: A Systematic Bibliometric Review
by Ruhaimatu Abudu, Raj Bridgelall, Bright Parker Quayson, Denver Tolliver and Kwabena Dadson
Designs 2025, 9(1), 23; https://doi.org/10.3390/designs9010023 - 18 Feb 2025
Viewed by 186
Abstract
Cybersecurity challenges are increasing in the rail industry because of constant technological evolution that includes the Internet of Things, blockchains, automation, and artificial intelligence. Consequently, many railroads and supply chain stakeholders have implemented strategies and practices to address these challenges. However, the pace [...] Read more.
Cybersecurity challenges are increasing in the rail industry because of constant technological evolution that includes the Internet of Things, blockchains, automation, and artificial intelligence. Consequently, many railroads and supply chain stakeholders have implemented strategies and practices to address these challenges. However, the pace of cybersecurity implementation in the railroad industry is slow even as cyberthreats escalate. This study uniquely integrates bibliometric analysis with a systematic literature review to provide a holistic view of cybersecurity trends in rail freight. The study analyzes 70 articles focusing on cybersecurity practices in the rail freight industry, structured around four research questions relating to: (1) challenges, (2) measures, (3) emerging trends, and (4) innovations. Key findings are that implementing cybersecurity practices in the rail freight industry comes with numerous challenges and risks. The study concludes that new threats will constantly emerge with technological advancements. Therefore, there is a need for continuous human training, collaboration, and coordination with stakeholders. This study also highlights research gaps and recommends how stakeholders can most appropriately execute cybersecurity strategies and best coordinate them with the various technological functions in the rail freight industry. Full article
Show Figures

Figure 1

Figure 1
<p>Framework of the study.</p>
Full article ">Figure 2
<p>PRISMA workflow results.</p>
Full article ">Figure 3
<p>Distribution of publication by year and reference type.</p>
Full article ">Figure 4
<p>Number of publications by country.</p>
Full article ">Figure 5
<p>Word cloud for the relevant studies using NVivo.</p>
Full article ">Figure 6
<p>Term co-occurrence network.</p>
Full article ">Figure 7
<p>Co-authorship network.</p>
Full article ">Figure 8
<p>Citation network.</p>
Full article ">
26 pages, 543 KiB  
Article
Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling
by Saif Al-Dean Qawasmeh and Ali Abdullah S. AlQahtani
Future Internet 2025, 17(2), 93; https://doi.org/10.3390/fi17020093 - 18 Feb 2025
Viewed by 263
Abstract
Insider threats pose a significant challenge to organizational cybersecurity, often leading to catastrophic financial and reputational damages. Traditional tools such as firewalls and antivirus systems lack the sophistication needed to detect and mitigate these threats in real time. This paper introduces a machine [...] Read more.
Insider threats pose a significant challenge to organizational cybersecurity, often leading to catastrophic financial and reputational damages. Traditional tools such as firewalls and antivirus systems lack the sophistication needed to detect and mitigate these threats in real time. This paper introduces a machine learning-based system that integrates real-time anomaly detection with dynamic user profiling, enabling the classification of employees into categories of low, medium, and high risk. The system was validated using a synthetic dataset, achieving exceptional accuracy across machine learning models, with XGBoost emerging as the most effective. Full article
Show Figures

Figure 1

Figure 1
<p>System workflow diagram.</p>
Full article ">Figure 2
<p>Alert generation.</p>
Full article ">Figure 3
<p>Data cleaning and preprocessing workflow.</p>
Full article ">Figure 4
<p>Performance results for the different ML models.</p>
Full article ">Figure 5
<p>Confusion matrices for the different models: (<b>a</b>) Random Forest (RF), (<b>b</b>) Logistic Regression (LR), (<b>c</b>) XGBoost, (<b>d</b>) Support Vector Machine (SVM).</p>
Full article ">Figure 6
<p>Detection and classification times.</p>
Full article ">
14 pages, 3053 KiB  
Article
Cyber Environment Test Framework for Simulating Command and Control Attack Methods with Reinforcement Learning
by Minki Jeong, Jongyoul Park and Sang Ho Oh
Appl. Sci. 2025, 15(4), 2120; https://doi.org/10.3390/app15042120 - 17 Feb 2025
Viewed by 214
Abstract
Recently, the IT industry has become larger, and cloud service has rapidly increased; thus cybersecurity to protect sensitive data from attacks has become an important factor. However, cloud services have become larger, making the surface area larger, and a complex cyber environment leads [...] Read more.
Recently, the IT industry has become larger, and cloud service has rapidly increased; thus cybersecurity to protect sensitive data from attacks has become an important factor. However, cloud services have become larger, making the surface area larger, and a complex cyber environment leads to difficulty managing and defending. With the rise of artificial intelligence, applying artificial intelligence to a cyber environment to automatically detect and respond to cyberattacks has begun to get attention. In order to apply artificial intelligence in cyber environments, a simulation framework that is easily applicable and can represent real situations well is needed. In this study, we introduce the framework Cyber Environment (CYE) that provides useful components that abstract complex and large cloud environments. Additionally, we use CYE to reproduce real-world situations into the scenario and apply reinforcement learning for training automated intelligence defense agents. Full article
Show Figures

Figure 1

Figure 1
<p>Visualization figure of blue team observation space and reward.</p>
Full article ">Figure 2
<p>This figure shows visualization figure of agent 0’s observation space when compromising agent 0 at 100th step. Malware send file list to red team server and red team CnC server receives list and exfiltrates files. After exfiltrate few files, CnC server deploy backdoor to compromised agent and backdoor continuously exfiltrates files and sends them to red team backdoor server.</p>
Full article ">Figure 3
<p>The log of the observation of the green team agent.</p>
Full article ">Figure 4
<p>The log of the observation of the red team agent.</p>
Full article ">Figure 5
<p>The log of the red team launches a phased attack.</p>
Full article ">Figure 6
<p>The log of the red team communicates with compromised hosts via CnC server.</p>
Full article ">Figure 7
<p>The log of the blue team takes the status of the hosts.</p>
Full article ">Figure 8
<p>Compare total score of each agent. DQL outperforms sleep and random agents but performs worse than perfect agents. DQL agents can be compared to other agents to confirm that DQL is trained and looking for appropriate behavior, but it is not fully optimal behavior compared to perfect agent.</p>
Full article ">
15 pages, 668 KiB  
Article
PenQA: A Comprehensive Instructional Dataset for Enhancing Penetration Testing Capabilities in Language Models
by Xiaofeng Zhong, Yunlong Zhang and Jingju Liu
Appl. Sci. 2025, 15(4), 2117; https://doi.org/10.3390/app15042117 - 17 Feb 2025
Viewed by 158
Abstract
Large language models’ domain-specific capabilities can be enhanced through specialized datasets, yet constructing comprehensive cybersecurity datasets remains challenging due to the field’s multidisciplinary nature. We present PenQA, a novel instructional dataset for penetration testing that integrates theoretical and practical knowledge. Leveraging authoritative sources [...] Read more.
Large language models’ domain-specific capabilities can be enhanced through specialized datasets, yet constructing comprehensive cybersecurity datasets remains challenging due to the field’s multidisciplinary nature. We present PenQA, a novel instructional dataset for penetration testing that integrates theoretical and practical knowledge. Leveraging authoritative sources like MITRE ATT&CK™ and Metasploit, we employ online large language models to generate approximately 50,000 question–answer pairs.We demonstrate PenQA’s efficacy by fine-tuning language models with fewer than 10 billion parameters. Evaluation metrics, including the BLEU, ROUGE, and BERTScore, show significant improvements in the models’ penetration testing capabilities. PenQA is designed to be compatible with various model architectures and updatable as new techniques emerge. This work has implications for automated penetration testing tools, cybersecurity education, and decision support systems. The PenQA dataset is available in our GitHub repository. Full article
(This article belongs to the Special Issue AI Technology and Security in Cloud/Big Data)
Show Figures

Figure 1

Figure 1
<p>The pipeline of our method for dataset construction and model augmentation. We have sanitized and organized the usage manuals of open-source cybersecurity tools and open-source cybersecurity knowledge documents into coherent text segments. Subsequently, we have extracted specific question-and-answer pairs from several of these segments, which include the usage commands for specific cybersecurity tools and concepts related to network security. Following this, we have designed an enhancement project that enables more capable large language models to learn the correspondences between our crafted questions and answers and the original text segments, thereby generating question-and-answer data for each segmented piece. Finally, we have split the resulting question-and-answer dataset and fine-tuned it on large language models under 10 B parameters to enhance their performance in penetration testing Q&amp;A tasks.</p>
Full article ">Figure 2
<p>Examples of techniques and some sub-techniques in ATT&amp;CK. These techniques symbolize the distinct phases and objectives of the penetration process, constituting a valuable knowledge base for penetration testing. Within each technique, the subtechniques offer a more granular classification and narrative, allowing cybersecurity practitioners, as well as large language models, to systematically absorb and comprehend the intricacies of the penetration testing process.</p>
Full article ">Figure 3
<p>The quantitative relationships between different modules. Exploit, Payloads, and Auxiliary modules constitute the majority of modules within Metasploit. Exploits, Payloads, and Auxiliary modules constitute the majority of all modules by number, with each module typically corresponding to a specific vulnerability. As vulnerabilities continue to be discovered, the modules available on the Metasploit open-source community are continually updated to reflect these findings.</p>
Full article ">Figure 4
<p>Basic template for generating penetration testing Q&amp;A prompts. By utilizing Roles, Skills, and Restrictions, we assist large language models in comprehending the requirements of a task and the boundaries of their capabilities within that task. This approach ensures the generation of data that are uniformly formatted and aligned with the domain-specific criteria.</p>
Full article ">Figure 5
<p>An example that demonstrates how a model fine-tuned on a dataset performs better than one that is not fine-tuned has been practically verified as the answer to this question.</p>
Full article ">
31 pages, 3691 KiB  
Article
Enhancing Smart Home Security: Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection
by Mohammed Shalan, Md Rakibul Hasan, Yan Bai and Juan Li
Smart Cities 2025, 8(1), 35; https://doi.org/10.3390/smartcities8010035 - 17 Feb 2025
Viewed by 178
Abstract
The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain technology to detect intrusions in smart home environments. The proposed [...] Read more.
The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain technology to detect intrusions in smart home environments. The proposed approach combines knowledge distillation and transfer learning to support heterogeneous IoT devices with varying computational capacities, ensuring efficient local training without compromising privacy. Blockchain technology is integrated to provide decentralized, tamper-resistant access control through Role-Based Access Control (RBAC), allowing only authenticated devices to participate in the federated learning process. This combination ensures data confidentiality, system integrity, and trust among devices. This framework’s performance was evaluated using the N-BaIoT dataset, showcasing its ability to detect anomalies caused by botnets such as Mirai and BASHLITE across diverse IoT devices. Results demonstrate significant improvements in intrusion detection accuracy, particularly for resource-constrained devices, while maintaining privacy and adaptability in dynamic smart home environments. These findings highlight the potential of this blockchain-enhanced federated learning system to offer a scalable, robust, and privacy-preserving solution for securing smart homes against evolving threats. Full article
(This article belongs to the Special Issue Big Data and AI Services for Sustainable Smart Cities)
Show Figures

Figure 1

Figure 1
<p>System Framework.</p>
Full article ">Figure 2
<p>Role-Based Access Control Mechanism for IoT Devices in a Smart Home Network.</p>
Full article ">Figure 3
<p>Centralized accuracies.</p>
Full article ">Figure 4
<p>Centralized losses.</p>
Full article ">Figure 5
<p>Federated accuracies.</p>
Full article ">Figure 6
<p>Federated losses.</p>
Full article ">Figure 7
<p>Code snippet of the proposed smart contract.</p>
Full article ">Figure 8
<p>Submitting Class Scores by Authorized Devices with CVW.</p>
Full article ">Figure 9
<p>Aggregating Submitted Class Scores by the Smart Contract.</p>
Full article ">Figure 10
<p>Rejecting Unauthorized Device Attempts to Participate in the FL Process.</p>
Full article ">
24 pages, 1945 KiB  
Article
Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol
by Mohammad Emran Hashimyar, Mahdi Aiash, Ali Khoshkholghi and Giacomo Nalli
Network 2025, 5(1), 5; https://doi.org/10.3390/network5010005 - 17 Feb 2025
Viewed by 173
Abstract
The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities. However, its increasing adoption has made it a target for various cyber threats, including Distributed Denial of Service (DDoS), [...] Read more.
The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities. However, its increasing adoption has made it a target for various cyber threats, including Distributed Denial of Service (DDoS), Man-in-the-Middle (MitM), and brute force attacks. This study presents a comprehensive analysis of AMQP-specific vulnerabilities and introduces a statistical model for the detection and classification of malicious activities in IoT networks. Leveraging a custom-designed IoT testbed, realistic attack scenarios were simulated, and a dataset encompassing normal, malicious, and mixed traffic was generated. Unique attack signatures were identified and validated through repeated experiments, forming the foundation of a signature-based detection mechanism tailored for AMQP networks. The proposed model demonstrated high accuracy in detecting and classifying attack-specific traffic while maintaining a low false positive rate for benign traffic. Notable results include effective detection of RST packets in DDoS scenarios, precise classification of MitM attack patterns, and identification of brute force attempts on AMQP systems. This research highlights the efficacy of signature-based approaches in enhancing IoT security and offers a benchmark for future machine learning-driven detection systems. By addressing AMQP-specific challenges, the study contributes to the development of resilient and secure IoT ecosystems. Full article
Show Figures

Figure 1

Figure 1
<p>Normal network traffic packets for AMQP.</p>
Full article ">Figure 2
<p>Normal network data exchange traffic for AMQP.</p>
Full article ">Figure 3
<p>DoS attack TCP handshake flags.</p>
Full article ">Figure 4
<p>DoS attack data exchange packets (Experiment 1).</p>
Full article ">Figure 5
<p>DoS attack data exchange packets (Experiment 2).</p>
Full article ">Figure 6
<p>DoS attack data exchange packets (Experiment 3).</p>
Full article ">Figure 7
<p>Analysis of AMQP MiTM packets.</p>
Full article ">Figure 8
<p>Analysis of AMQP brute force attack packets.</p>
Full article ">Figure 9
<p>DoS attack signature.</p>
Full article ">Figure 10
<p>Classification results of network traces for DoS attacks (normal, malicious, and RST).</p>
Full article ">Figure 11
<p>Detection of normal packets in AMQP traffic dataset.</p>
Full article ">Figure 12
<p>Detection results for malicious packets in DoS dataset.</p>
Full article ">Figure 13
<p>MiTM attack signature.</p>
Full article ">Figure 14
<p>Detection results for MiTM attack packets in normal and malicious datasets.</p>
Full article ">Figure 15
<p>Detection results for normal packets in AMQP traffic.</p>
Full article ">Figure 16
<p>Detection results for malicious packets in MiTM dataset.</p>
Full article ">Figure 17
<p>Brute force attack signature.</p>
Full article ">Figure 18
<p>Detection results for normal and malicious packets in brute force attacks.</p>
Full article ">Figure 19
<p>Detection results for normal packets in AMQP brute force dataset.</p>
Full article ">Figure 20
<p>Detection results for malicious packets in AMQP brute force dataset.</p>
Full article ">
33 pages, 6514 KiB  
Article
IoT-Driven Resilience Monitoring: Case Study of a Cyber-Physical System
by Ali Aghazadeh Ardebili, Cristian Martella, Antonella Longo, Chiara Rucco, Federico Izzi and Antonio Ficarella
Appl. Sci. 2025, 15(4), 2092; https://doi.org/10.3390/app15042092 - 17 Feb 2025
Viewed by 116
Abstract
This study focuses on Digital Twin-integrated smart energy systems, which serve as an example of Next-Generation Critical Infrastructures (CI). The resilience of these systems is influenced by a variety of internal features and external interactions, all of which are subject to change following [...] Read more.
This study focuses on Digital Twin-integrated smart energy systems, which serve as an example of Next-Generation Critical Infrastructures (CI). The resilience of these systems is influenced by a variety of internal features and external interactions, all of which are subject to change following cyber-physical disturbances. This necessitates real-time resilience monitoring for CI during crises; however, a significant gap remains in resilience monitoring. To address this gap, this study leverages the role of Internet of Things (IoT) in monitoring complex systems to enhance resilience through critical indicators relevant to cyber-physical safety and security. The study empirically implements Resilience-Key Performance Indicators (R-KPIs) from the domain, including Functionality Loss, Minimum Performance, and Recovery Time Duration. The main goal is to examine real-time IoT-based resilience monitoring in a real-life context. A cyber-physical system equipped with IoT-driven Digital Twins, data-driven microservices, and a False Data Injection Attack (FDIA) scenario is simulated to assess the real-time resilience of this smart system. The results demonstrate that real-time resilience monitoring provides actionable insights into resilience performance based on the selected R-KPIs. These findings contribute to a systematic and reusable model for enhancing the resilience of IoT-enabled CI, advancing efforts to ensure service continuity and secure essential services for society. Full article
(This article belongs to the Special Issue The Internet of Things (IoT) and Its Application in Monitoring)
Show Figures

Figure 1

Figure 1
<p>Illustration of recovery time. The red box highlights the point on the resilience curve where the recovery phases duration can be identified.</p>
Full article ">Figure 2
<p>Illustration of minimum performance level. The red box highlights the point on the resilience curve where the minimum performance level can be identified.</p>
Full article ">Figure 3
<p>(<b>a</b>,<b>b</b>) Graphical illustration of different behaviors after disturbance [<a href="#B68-applsci-15-02092" class="html-bibr">68</a>].</p>
Full article ">Figure 4
<p>Graphical illustration of Loss of Functionality [<a href="#B67-applsci-15-02092" class="html-bibr">67</a>].</p>
Full article ">Figure 5
<p>Conceptual model of the proposed system [<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 6
<p>SPVS physical asset implementation. (<b>a</b>) Control system (<a href="#applsci-15-02092-t001" class="html-table">Table 1</a>). (<b>b</b>) Motion mechanism. (<b>c</b>) Assembled view (back view).</p>
Full article ">Figure 7
<p>The logical model of the smart PV system [<a href="#B45-applsci-15-02092" class="html-bibr">45</a>,<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 8
<p>Dynamic 3D model with 2 degrees of freedom (Dof) that is used to visualize the current gradient of the PV module [<a href="#B45-applsci-15-02092" class="html-bibr">45</a>,<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 9
<p>Data Connector flowchart.</p>
Full article ">Figure 10
<p>Interactive Platform Interface [<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 11
<p>The equivalent circuit of the PV module with the load.</p>
Full article ">Figure 12
<p>The block diagram of Kalman filter method that is used in current approach.</p>
Full article ">Figure 13
<p>Mapping of the Edge-cloud architectural framework. (<b>a</b>) Scope of the European Industrial cloud and edge Roadmap [<a href="#B90-applsci-15-02092" class="html-bibr">90</a>]. (<b>b</b>) Edge-cloud architecture of the system [<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 14
<p>Solar Elevation on Monday, 18 December 2023 in Lecce.</p>
Full article ">Figure 15
<p>Cloud Cover on Monday, 18 December 2023 in Lecce.</p>
Full article ">Figure 16
<p>Temperature on Monday, 18 December 2023 in Lecce.</p>
Full article ">Figure 17
<p>The voltage of the panel on Monday, 18 December 2023 in Lecce influenced by a dynamic environment including sunrise and sunset <a href="#applsci-15-02092-f014" class="html-fig">Figure 14</a>, cloud cover <a href="#applsci-15-02092-f015" class="html-fig">Figure 15</a>, and temperature <a href="#applsci-15-02092-f016" class="html-fig">Figure 16</a>.</p>
Full article ">Figure 18
<p>Panel voltage (on Monday, 18 December 2023): comparison between original data and rolling average.</p>
Full article ">Figure 19
<p>PV panel output and battery level.</p>
Full article ">Figure 20
<p>Sunset: PV output and air temperature.</p>
Full article ">Figure 21
<p>Bus voltage measurement during the disturbance (voltate in volts).</p>
Full article ">Figure 22
<p>The irregular behaviour of the system after disturbance.</p>
Full article ">Figure 23
<p>The resilience curve (fitted by SVR).</p>
Full article ">Figure 24
<p>Functionality Loss calculation using the resilience curve fitted by SVR.</p>
Full article ">Figure 25
<p>Functionality Loss calculation using the resilience curve fitted by Least Squares.</p>
Full article ">
27 pages, 5252 KiB  
Article
Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries
by Fahim Sufi and Musleh Alsulami
Mathematics 2025, 13(4), 655; https://doi.org/10.3390/math13040655 - 17 Feb 2025
Viewed by 88
Abstract
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging [...] Read more.
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging a dataset of 9261 entries filtered from over 1 million news articles. Existing approaches often fail to capture nuanced patterns across such complex datasets, justifying the need for innovative methodologies. We present a rigorous mathematical framework integrating chi-square tests, Bayesian inference, Gaussian Mixture Models (GMMs), and Spectral Clustering. This framework identifies key patterns, such as 1150 Zero-Day Exploits clustered in the IT and Telecommunications sector, 732 Advanced Persistent Threats (APTs) in Government and Public Administration, and Malware with a posterior probability of 0.287 dominating the Healthcare sector. Temporal analyses reveal periodic spikes, such as in Zero-Day Exploits, and a persistent presence of Social Engineering Attacks, with 1397 occurrences across industries. These findings are quantified using significance scores (mean: 3.25 ± 0.7) and posterior probabilities, providing evidence for industry-specific vulnerabilities. This research offers actionable insights for policymakers, cybersecurity professionals, and organizational decision makers by equipping them with a data-driven understanding of sector-specific risks. The mathematical formulations are replicable and scalable, enabling organizations to allocate resources effectively and develop proactive defenses against emerging threats. By bridging mathematical theory to real-world cybersecurity challenges, this study delivers impactful contributions toward safeguarding critical infrastructure and digital assets. Full article
(This article belongs to the Special Issue Analytical Frameworks and Methods for Cybersecurity, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Diagram of methodology.</p>
Full article ">Figure 2
<p>News data acquisition process. GPT-Based extraction of features was performed on the News title.</p>
Full article ">Figure 3
<p>Heatmap of significant attack types across key industries. The figure highlights the clustering of specific attack types within prominent industries, showcasing their frequency and distribution.</p>
Full article ">Figure 4
<p>Dominant attack types per top 7 industries. The chart highlights the leading attack types for the most impacted industries, emphasizing their frequency and dominance.</p>
Full article ">Figure 5
<p>Bar chart of dominant attack types across significant industries. The figure illustrates the posterior probabilities <math display="inline"><semantics> <mrow> <mi>P</mi> <mo>(</mo> <mi>A</mi> <mo>|</mo> <mi>I</mi> <mo>)</mo> </mrow> </semantics></math>, highlighting the most prevalent attack types for each key industry.</p>
Full article ">Figure 6
<p>Heatmap of posterior probabilities <math display="inline"><semantics> <mrow> <mi>P</mi> <mo>(</mo> <mi>A</mi> <mo>|</mo> <mi>I</mi> <mo>)</mo> </mrow> </semantics></math>. The figure visualizes the clustering of attack types across industries, providing a detailed view of their prevalence and likelihood.</p>
Full article ">Figure 7
<p>Results obtained with GMM Clustering. The figure shows clusters of attack types based on their relationships with industries.</p>
Full article ">Figure 8
<p>Results obtained with Spectral Clustering. The figure highlights affinity-based clusters of attack types across industries.</p>
Full article ">Figure 9
<p>Temporal trends of top 4 attack types. The figure illustrates the monthly frequencies of the most significant attack types, showcasing their dynamic nature over time.</p>
Full article ">Figure A1
<p>Distribution of top 5 attack types for Information Technology and Telecommunication.</p>
Full article ">Figure A2
<p>Distribution of top 5 attack types for Government and Public Administration.</p>
Full article ">Figure A3
<p>Distribution of top 5 attack types for Financial Services.</p>
Full article ">Figure A4
<p>Distribution of top 5 attack types for Healthcare and Public Health.</p>
Full article ">Figure A5
<p>Distribution of top 5 attack types for Manufacturing and Industrial.</p>
Full article ">Figure A6
<p>Distribution of top 5 attack types for Retail and E-commerce.</p>
Full article ">Figure A7
<p>Distribution of top 5 attack types for Transportation and Logistics.</p>
Full article ">Figure A8
<p>Distribution of top 5 attack types for Energy and Utilities.</p>
Full article ">
14 pages, 364 KiB  
Article
The Impact of Cyber Governance Quality on Dividend Policy in Mitigating Cybersecurity Breaches
by Manar Al-Mohareb
Risks 2025, 13(2), 34; https://doi.org/10.3390/risks13020034 - 17 Feb 2025
Viewed by 149
Abstract
This study investigates the relationship between cyber risks and dividend policy, as well as how boards, as a governance mechanism, affect the dividend policy under cyber risk. This study collected firm-level financing, corporate governance, and control variables from the Bloomberg database during the [...] Read more.
This study investigates the relationship between cyber risks and dividend policy, as well as how boards, as a governance mechanism, affect the dividend policy under cyber risk. This study collected firm-level financing, corporate governance, and control variables from the Bloomberg database during the period 2013–2022. This paper measures of cyber risk through publicly available corporate disclosures on Form 10-K. The findings confirmed that cyber risks significantly impact dividend policy by posing challenges to corporate technical communication and financial transparency. Effective boards play a critical role in guiding companies toward governance strategies that enhance dividend policy and improve cybersecurity. This study involves policy and practical implications, where research findings suggest the need to strengthen regulatory frameworks that encourage the adoption of strong governance practices and advanced cybersecurity practices within companies. On the practical level, companies should adopt a proactive approach to managing cyber risks by enhancing investments in this area and developing flexible dividend policies. Full article
Back to TopTop