Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,351)

Search Parameters:
Keywords = cybersecurity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 25658 KiB  
Article
AI Threats to Politics, Elections, and Democracy: A Blockchain-Based Deepfake Authenticity Verification Framework
by Masabah Bint E. Islam, Muhammad Haseeb, Hina Batool, Nasir Ahtasham and Zia Muhammad
Blockchains 2024, 2(4), 458-481; https://doi.org/10.3390/blockchains2040020 - 21 Nov 2024
Abstract
The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects of society, its influence on political processes and elections has become a critical area of concern. This is because AI language models [...] Read more.
The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects of society, its influence on political processes and elections has become a critical area of concern. This is because AI language models are far from neutral or objective; they inherit biases from their training data and the individuals who design and utilize them, which can sway voter decisions and affect global elections and democracy. In this research paper, we explore how AI can directly impact election outcomes through various techniques. These include the use of generative AI for disseminating false political information, favoring certain parties over others, and creating fake narratives, content, images, videos, and voice clones to undermine opposition. We highlight how AI threats can influence voter behavior and election outcomes, focusing on critical areas, including political polarization, deepfakes, disinformation, propaganda, and biased campaigns. In response to these challenges, we propose a Blockchain-based Deepfake Authenticity Verification Framework (B-DAVF) designed to detect and authenticate deepfake content in real time. It leverages the transparency of blockchain technology to reinforce electoral integrity. Finally, we also propose comprehensive countermeasures, including enhanced legislation, technological solutions, and public education initiatives, to mitigate the risks associated with AI in electoral contexts, proactively safeguard democracy, and promote fair elections. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

Figure 1
<p>The figure provides an overview of the different advantages and threats of using AI in elections, political campaigns, and electoral management.</p>
Full article ">Figure 2
<p>Overview of the Blockchain-based Deepfake Authenticity Verification Framework (B-DAVF). This diagram illustrates the six major components of the B-DAVF: (1) content creation, (2) registering the asset, (3) tracking modifications, (4) storing the provenance, (5) verification process, and (6) flagging and reporting.</p>
Full article ">Figure 3
<p>A visual representation of countermeasures against AI threats. This diagram outlines key strategies to mitigate AI risks. The main categories include Regulatory Measures, Technological Solutions, Public Awareness and Education, and Suggestions for Policymakers and Researchers. Each category is further broken down into specific actions to mitigate the potential risks posed by AI in elections.</p>
Full article ">
18 pages, 13728 KiB  
Article
BG-YOLO: A Bidirectional-Guided Method for Underwater Object Detection
by Ruicheng Cao, Ruiteng Zhang, Xinyue Yan and Jian Zhang
Sensors 2024, 24(22), 7411; https://doi.org/10.3390/s24227411 - 20 Nov 2024
Viewed by 206
Abstract
Degraded underwater images decrease the accuracy of underwater object detection. Existing research uses image enhancement methods to improve the visual quality of images, which may not be beneficial in underwater image detection and lead to serious degradation in detector performance. To alleviate this [...] Read more.
Degraded underwater images decrease the accuracy of underwater object detection. Existing research uses image enhancement methods to improve the visual quality of images, which may not be beneficial in underwater image detection and lead to serious degradation in detector performance. To alleviate this problem, we proposed a bidirectional guided method for underwater object detection, referred to as BG-YOLO. In the proposed method, a network is organized by constructing an image enhancement branch and an object detection branch in a parallel manner. The image enhancement branch consists of a cascade of an image enhancement subnet and object detection subnet. The object detection branch only consists of a detection subnet. A feature-guided module connects the shallow convolution layers of the two branches. When training the image enhancement branch, the object detection subnet in the enhancement branch guides the image enhancement subnet to be optimized towards the direction that is most conducive to the detection task. The shallow feature map of the trained image enhancement branch is output to the feature-guided module, constraining the optimization of the object detection branch through consistency loss and prompting the object detection branch to learn more detailed information about the objects. This enhances the detection performance. During the detection tasks, only the object detection branch is reserved so that no additional computational cost is introduced. Extensive experiments demonstrate that the proposed method significantly improves the detection performance of the YOLOv5s object detection network (the mAP is increased by up to 2.9%) and maintains the same inference speed as YOLOv5s (132 fps). Full article
(This article belongs to the Special Issue Machine Learning in Image/Video Processing and Sensing)
Show Figures

Figure 1

Figure 1
<p>Different ways of combining underwater image enhancement and object detection.</p>
Full article ">Figure 2
<p>Overview of BG-YOLO framework.</p>
Full article ">Figure 3
<p>Overview of the image enhancement branch.</p>
Full article ">Figure 4
<p>Overview of the feature-guided module.</p>
Full article ">Figure 5
<p>Visualized detection results for different methods on the URPC2019 dataset.</p>
Full article ">Figure 6
<p>Isualized detection results for different methods on the URPC2020 dataset.</p>
Full article ">Figure 7
<p>PR curve of the test results for URPC2019.</p>
Full article ">Figure 8
<p>PR curve of the test results for URPC2020.</p>
Full article ">
19 pages, 6034 KiB  
Article
GMN+: A Binary Homologous Vulnerability Detection Method Based on Graph Matching Neural Network with Enhanced Attention
by Zheng Zhao, Tianhao Zhang, Xiaoya Fan, Qian Mao, Dafeng Wang and Qi Zhao
Appl. Sci. 2024, 14(22), 10762; https://doi.org/10.3390/app142210762 - 20 Nov 2024
Viewed by 298
Abstract
The widespread reuse of code in the open-source community has led to the proliferation of homologous vulnerabilities, which are security flaws propagated across diverse software systems through the reuse of vulnerable code. Such vulnerabilities pose serious cybersecurity risks, as attackers can exploit the [...] Read more.
The widespread reuse of code in the open-source community has led to the proliferation of homologous vulnerabilities, which are security flaws propagated across diverse software systems through the reuse of vulnerable code. Such vulnerabilities pose serious cybersecurity risks, as attackers can exploit the same weaknesses across multiple platforms. Deep learning has emerged as a promising approach for detecting homologous vulnerabilities in binary code due to their automated feature extraction and high efficiency. However, existing deep learning methods often struggle to capture deep semantic features in binary code, limiting their effectiveness. To address this limitation, this paper presents GMN+, which is a novel graph matching neural network with enhanced attention for detecting homologous vulnerabilities. This method comprehensively considers the information contained in instructions and incorporates types of input instruction. Masked Language Modeling and Instruction Type Prediction are developed as pre-training tasks to enhance the ability of GMN+ in extracting semantic information from basic blocks. GMN+ utilizes an attention mechanism to focus concurrently on the critical semantic information within functions and differences between them, generating robust function embeddings. Experimental results indicate that GMN+ outperforms state-of-the-art methods in various tasks and achieves notable performance in real-world vulnerability detection scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>Architecture of the GMN+ model.</p>
Full article ">Figure 2
<p>An example of instruction normalization and instruction type extraction. (<b>a</b>) Original assembly instructions; (<b>b</b>) Normalized instructions; (<b>c</b>) Instruction types.</p>
Full article ">Figure 3
<p>BERT input embedding.</p>
Full article ">Figure 4
<p>Graph Learner of GMN+.</p>
Full article ">Figure 5
<p>Comparison of ROC curves for different methods across architectures.</p>
Full article ">Figure 6
<p>Comparison of ROC curves for different methods across optimization levels.</p>
Full article ">Figure 7
<p>Comparative results of homologous function search using various methods.</p>
Full article ">Figure 8
<p>Comparison of time overhead for different methods.</p>
Full article ">Figure 9
<p>The performance of GMN+ variants with different blocks in the Semantic Learner.</p>
Full article ">Figure 10
<p>The performance of GMN+ variants with different blocks in the Graph Learner.</p>
Full article ">Figure 11
<p>Comparison of detection results of different methods on real-world vulnerability detection tasks.</p>
Full article ">
27 pages, 2383 KiB  
Article
Integrating a Virtual Assistant by Using the RAG Method and VERTEX AI Framework at Algebra University
by Zlatan Morić, Leo Mršić, Mario Filjak and Goran Đambić
Appl. Sci. 2024, 14(22), 10748; https://doi.org/10.3390/app142210748 - 20 Nov 2024
Viewed by 258
Abstract
The development and testing of a virtual assistant (VA) designed to enhance information retrieval and support in an academic environment are presented in this paper, with the Retrieval-Augmented Generation (RAG) approach being utilized alongside Google’s VERTEX AI Palm-2 model. A novel integration of [...] Read more.
The development and testing of a virtual assistant (VA) designed to enhance information retrieval and support in an academic environment are presented in this paper, with the Retrieval-Augmented Generation (RAG) approach being utilized alongside Google’s VERTEX AI Palm-2 model. A novel integration of RAG with contextual learning is introduced in this study, specifically for applications in university contact centers, where accuracy and relevance are considered paramount. The effectiveness of the VA was evaluated through user testing, focusing on two primary hypotheses: first, that the VA can achieve accurate interpretation and response to queries with context-based information, and second, that the VA minimizes potential harm from erroneous responses. In total, 187 participants were involved in the testing, and a diverse set of inquiries was utilized, resulting in 561 query–response interactions that were analyzed. It was shown that contextual data significantly reduced hallucinations and increased response accuracy, thereby underscoring the value of the RAG method in applications requiring high levels of specificity. Furthermore, the study provides empirical insights into the impact of AI-generated hallucinations and response inconsistencies, particularly about structured or procedural data. A framework for mitigating these challenges in future implementations is also offered. The scalability and adaptability of the RAG method in specialized academic contexts are demonstrated in this work, with broader implications for integrating AI-driven VAs across educational and professional domains being highlighted. Full article
Show Figures

Figure 1

Figure 1
<p>System Architecture for Scalable and Accurate Contextual Response Generation Using Palm-2 Model.</p>
Full article ">Figure 2
<p>SMAC Application Interface: Key Functional Elements and User Interaction Workflow.</p>
Full article ">Figure 3
<p>Workflow for Query Formation and Contextual Response Generation in the RAG Method.</p>
Full article ">Figure 4
<p>Data Preparation and Vectorization Workflow for Semantic Similarity Retrieval.</p>
Full article ">Figure 5
<p>Prediction Accuracy with and without Context.</p>
Full article ">Figure 6
<p>Hallucination Occurrence by Context Relevance.</p>
Full article ">Figure 7
<p>User Satisfaction Rating Distribution Across Metrics.</p>
Full article ">Figure 8
<p>Overall User Satisfaction Ratings Across Metrics.</p>
Full article ">Figure 9
<p>Proportion of Accurate vs. Hallucinated Responses.</p>
Full article ">Figure 10
<p>High-Risk vs. Low-Risk Errors.</p>
Full article ">
17 pages, 852 KiB  
Article
Boosting Few-Shot Network Intrusion Detection with Adaptive Feature Fusion Mechanism
by Jue Bo, Kai Chen, Shenghui Li and Pengyi Gao
Electronics 2024, 13(22), 4560; https://doi.org/10.3390/electronics13224560 - 20 Nov 2024
Viewed by 226
Abstract
In network security, intrusion detection systems (IDSs) are essential for maintaining network integrity. Traditional IDSs primarily use supervised learning, relying on extensive datasets for effective training, which limits their ability to address rapidly evolving cyber threats, especially with limited data samples. To overcome [...] Read more.
In network security, intrusion detection systems (IDSs) are essential for maintaining network integrity. Traditional IDSs primarily use supervised learning, relying on extensive datasets for effective training, which limits their ability to address rapidly evolving cyber threats, especially with limited data samples. To overcome this, prior research has applied meta-learning methods to distinguish between normal and malicious network traffic, showing promising results mainly in binary classification scenarios. However, challenges remain in model information acquisition within few-shot learning (FSL) frameworks. This study introduces a metric-based meta-learning strategy that constructs prototypes for each sample category, improving the model’s ability to manage multi-class scenarios. Additionally, we propose an Adaptive Feature Fusion (AFF) mechanism that dynamically integrates statistical features and binary data streams to extract meaningful insights from limited datasets, thereby enhancing the effectiveness of IDSs in few-shot learning contexts. By introducing a metric-based meta-learning method and the Adaptive Feature Fusion mechanism, this study provides a feasible solution for developing a high-accuracy, multi-class few-shot intrusion detection system. A series of experiments show that this approach significantly improves the effectiveness of the intrusion detection system, achieving an impressive accuracy of 97.78% in multi-class tasks, even when the sample size is reduced to just one. Full article
Show Figures

Figure 1

Figure 1
<p>An abstract illustration demonstrating the meta-learning process. G represents normal traffic, A, B, C and F represent malicious traffic, with F having very few samples. The symbol ? denotes the classification of the sample into its respective category.</p>
Full article ">Figure 2
<p>Segmentation and examples of binary data stream representation.</p>
Full article ">Figure 3
<p>Pipeline of handling a binary data stream representation.</p>
Full article ">Figure 4
<p>Overall architecture of AFF.</p>
Full article ">Figure 5
<p>Accuracy of ablation experiments for binary and multi-class tasks. This figure shows the accuracy results from the ablation experiments.</p>
Full article ">Figure 6
<p>Accuracy and recall of feasibility experiments on the reconstructed ISCX2012 dataset.</p>
Full article ">
18 pages, 1819 KiB  
Article
Detecting Adversarial Attacks in IoT-Enabled Predictive Maintenance with Time-Series Data Augmentation
by Flora Amato, Egidia Cirillo, Mattia Fonisto and Alberto Moccardi
Information 2024, 15(11), 740; https://doi.org/10.3390/info15110740 - 20 Nov 2024
Viewed by 350
Abstract
Despite considerable advancements in integrating the Internet of Things (IoT) and artificial intelligence (AI) within the industrial maintenance framework, the increasing reliance on these innovative technologies introduces significant vulnerabilities due to cybersecurity risks, potentially compromising the integrity of decision-making processes. Accordingly, this study [...] Read more.
Despite considerable advancements in integrating the Internet of Things (IoT) and artificial intelligence (AI) within the industrial maintenance framework, the increasing reliance on these innovative technologies introduces significant vulnerabilities due to cybersecurity risks, potentially compromising the integrity of decision-making processes. Accordingly, this study aims to offer comprehensive insights into the cybersecurity challenges associated with predictive maintenance, proposing a novel methodology that leverages generative AI for data augmentation, enhancing threat detection capabilities. Experimental evaluations conducted using the NASA Commercial Modular Aero-Propulsion System Simulation (N-CMAPSS) dataset affirm the viability of this approach leveraging the state-of-the-art TimeGAN model for temporal-aware data generation and building a recurrent classifier for attack discrimination in a balanced dataset. The classifier’s results demonstrate the satisfactory and robust performance achieved in terms of accuracy (between 80% and 90%) and how the strategic generation of data can effectively bolster the resilience of intelligent maintenance systems against cyber threats. Full article
Show Figures

Figure 1

Figure 1
<p>Relationship between vulnerabilities and impact of attacks.</p>
Full article ">Figure 2
<p>Failure-data scarcity and augmentation practices in predictive maintenance.</p>
Full article ">Figure 3
<p>NASA Commercial Modular Aero-Propulsion Simulation System (N-CMAPSS) [<a href="#B34-information-15-00740" class="html-bibr">34</a>].</p>
Full article ">Figure 4
<p>Compact workflow diagram for IoT system integration.</p>
Full article ">Figure 5
<p>Time-series data augmentation.</p>
Full article ">Figure 6
<p>Time GAN architecture, kernels and loss functions.</p>
Full article ">Figure 7
<p>Exploratory data analysis of FD001 N-CMAPSS dataset.</p>
Full article ">Figure 8
<p>TimeGAN training process.</p>
Full article ">Figure 9
<p>Visualization of synthetic data and original data with PCA and t-SNE.</p>
Full article ">Figure 10
<p>Training and validation performance of the classifier over 250 epochs. The left panel shows accuracy, and the right panel shows AUC. Solid lines represent training metrics, and dashed lines represent validation metrics.</p>
Full article ">
13 pages, 1068 KiB  
Article
Constructing Cybersecurity Stocks Portfolio Using AI
by Avishay Aiche, Zvi Winer and Gil Cohen
Forecasting 2024, 6(4), 1065-1077; https://doi.org/10.3390/forecast6040053 - 19 Nov 2024
Viewed by 158
Abstract
This study explores the application of artificial intelligence, specifically ChatGPT-4o, in constructing and managing a portfolio of cybersecurity stocks over the period from Q1 2018 to Q1 2024. Leveraging advanced machine learning models, fundamental analysis, sentiment analysis, and optimization techniques, the AI-driven portfolio [...] Read more.
This study explores the application of artificial intelligence, specifically ChatGPT-4o, in constructing and managing a portfolio of cybersecurity stocks over the period from Q1 2018 to Q1 2024. Leveraging advanced machine learning models, fundamental analysis, sentiment analysis, and optimization techniques, the AI-driven portfolio significantly outperformed leading cybersecurity ETFs, as well as broader market indices such as the Nasdaq 100 (QQQ) and S&P 500 (SPY). The methodology employed included data collection, stock filtering, predictive modeling using Random Forests and Support Vector Machines (SVMs), sentiment analysis through natural language processing (NLP), and portfolio optimization using Mean-Variance Optimization (MVO), with quarterly rebalancing to ensure responsiveness to evolving market conditions. The AI-selected portfolio achieved a total return of 273%, with strong risk-adjusted performance as demonstrated by key metrics such as the Sharpe ratio, highlighting the effectiveness of an AI-based approach in navigating market complexities and generating superior returns. The results of this study indicate that AI-driven portfolio management can uncover investment opportunities that traditional methods may overlook, offering a competitive edge in the cybersecurity sector and promising enhanced predictive accuracy, efficiency, and overall investment success as AI technologies continue to evolve. Full article
Show Figures

Figure 1

Figure 1
<p>Cumulative profit over time from Q1 2018 to Q1 2024, demonstrating the significant upward trend and overall growth in the portfolio’s value, with notable spikes and recoveries reflecting market dynamics and strategic stock selections.</p>
Full article ">Figure 2
<p>Portfolio value over time from Q1 2018 to Q1 2024, highlighting the consistent growth trajectory, periodic market corrections, and the portfolio’s ability to recover and sustain value, peaking at Q1 2024.</p>
Full article ">Figure 3
<p>Quarterly profit over time from Q1 2018 to Q1 2024, showing variability in quarterly profits with substantial gains and occasional losses, reflecting the dynamic nature of the cybersecurity sector and strategic stock performance.</p>
Full article ">
16 pages, 1080 KiB  
Article
Fuzzy Coalition Graphs: A Framework for Understanding Cooperative Dominance in Uncertain Networks
by Yongsheng Rao, Srinath Ponnusamy, Sundareswaran Raman, Aysha Khan and Jana Shafi
Mathematics 2024, 12(22), 3614; https://doi.org/10.3390/math12223614 - 19 Nov 2024
Viewed by 279
Abstract
In a fuzzy graph G, a fuzzy coalition is formed by two disjoint vertex sets V1 and V2, neither of which is a strongly dominating set, but the union V1V2 forms a strongly dominating set. [...] Read more.
In a fuzzy graph G, a fuzzy coalition is formed by two disjoint vertex sets V1 and V2, neither of which is a strongly dominating set, but the union V1V2 forms a strongly dominating set. A fuzzy coalition partition of G is defined as Π={V1,V2,,Vk}, where each set Vi either forms a singleton strongly dominating set or is not a strongly dominating set but forms a fuzzy coalition with another non-strongly dominating set in Π. A fuzzy graph with such a fuzzy coalition partition Π is called a fuzzy coalition graph, denoted as FG(G,Π). The vertex set of the fuzzy coalition graph consists of {V1,V2,,Vk}, corresponding one-to-one with the sets of Π, and the two vertices are adjacent in FG(G,Π) if and only if Vi and Vj are fuzzy coalition partners in Π. This study demonstrates how fuzzy coalition graphs can model and optimize cybersecurity collaborations across critical infrastructures in smart cities, ensuring comprehensive protection against cyber threats. This study concludes that fuzzy coalition graphs offer a robust framework for optimizing collaboration and decision-making in interconnected systems like smart cities. Full article
Show Figures

Figure 1

Figure 1
<p>Fuzzy graph <math display="inline"><semantics> <mi mathvariant="double-struck">G</mi> </semantics></math> with <math display="inline"><semantics> <mn mathvariant="monospace">5</mn> </semantics></math> vertices.</p>
Full article ">Figure 2
<p><math display="inline"><semantics> <msub> <mi mathvariant="double-struck">C</mi> <mn mathvariant="monospace">5</mn> </msub> </semantics></math> graph.</p>
Full article ">Figure 3
<p>Fuzzy coalition graph (<math display="inline"><semantics> <msub> <mi mathvariant="double-struck">K</mi> <mn mathvariant="monospace">3</mn> </msub> </semantics></math> graph).</p>
Full article ">Figure 4
<p>City cybersecurity graph.</p>
Full article ">Figure 5
<p>Fuzzy coalition graph.</p>
Full article ">
32 pages, 5273 KiB  
Article
Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics
by Zlatan Morić, Vedran Dakić, Ana Kapulica and Damir Regvart
Electronics 2024, 13(22), 4546; https://doi.org/10.3390/electronics13224546 - 19 Nov 2024
Viewed by 349
Abstract
This article delves into Microsoft Azure’s cyber forensic capabilities, focusing on the unique challenges in cloud security incident investigation. Cloud services are growing in popularity, and Azure’s shared responsibility model, multi-tenant nature, and dynamically scalable resources offer unique advantages and complexities for digital [...] Read more.
This article delves into Microsoft Azure’s cyber forensic capabilities, focusing on the unique challenges in cloud security incident investigation. Cloud services are growing in popularity, and Azure’s shared responsibility model, multi-tenant nature, and dynamically scalable resources offer unique advantages and complexities for digital forensics. These factors complicate forensic evidence collection, preservation, and analysis. Data collection, logging, and virtual machine analysis are covered, considering physical infrastructure restrictions and cloud data transience. It evaluates Azure-native and third-party forensic tools and recommends methods that ensure effective investigations while adhering to legal and regulatory standards. It also describes how AI and machine learning automate data analysis in forensic investigations, improving speed and accuracy. This integration advances cyber forensic methods and sets new standards for future innovations. Unified Audit Logs (UALs) in Azure are examined, focusing on how Azure Data Explorer and Kusto Query Language (KQL) can effectively parse and query large datasets and unstructured data to detect sophisticated cyber threats. The findings provide a framework for other organizations to improve forensic analysis, advancing cloud cyber forensics while bridging theoretical practices and practical applications, enhancing organizations’ ability to combat increasingly sophisticated cybercrime. Full article
(This article belongs to the Special Issue Artificial Intelligence and Database Security)
Show Figures

Figure 1

Figure 1
<p>Cyber forensics process diagram.</p>
Full article ">Figure 2
<p>Mapping forensic workflow of ransomware attack.</p>
Full article ">Figure 3
<p>AI-enhanced cyber forensic investigation in Azure.</p>
Full article ">
23 pages, 3006 KiB  
Article
Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis
by Zeeshan Afzal, Mathias Ekstedt, Nils Müller and Preetam Mukherjee
Electronics 2024, 13(22), 4522; https://doi.org/10.3390/electronics13224522 - 18 Nov 2024
Viewed by 363
Abstract
Flexibility markets are crucial for balancing the decentralised and renewable-driven energy landscape. This paper presents a security evaluation of a flexibility market system using a threat modelling approach. A reference architecture for a typical flexibility market system is proposed, and attack graph-driven simulations [...] Read more.
Flexibility markets are crucial for balancing the decentralised and renewable-driven energy landscape. This paper presents a security evaluation of a flexibility market system using a threat modelling approach. A reference architecture for a typical flexibility market system is proposed, and attack graph-driven simulations are performed to analyse potential attack pathways where malicious actors might infiltrate the system and the vulnerabilities they might exploit. Key findings include the identification of high-risk areas, such as the Internet links between market actors. To mitigate these risks, the paper proposes and evaluates multiple protection scenarios in reducing the identified attack vectors. The findings underline the importance of multi-layered security strategies to safeguard flexibility markets from increasingly sophisticated cyber threats. Full article
(This article belongs to the Special Issue Anomaly Detection and Prevention in the Smart Grid)
Show Figures

Figure 1

Figure 1
<p>Reference architecture model for a flexibility market.</p>
Full article ">Figure 2
<p>Component description of the technical architecture.</p>
Full article ">Figure 3
<p>Overview of coreLang [<a href="#B37-electronics-13-04522" class="html-bibr">37</a>].</p>
Full article ">Figure 4
<p>Model view for FAO.</p>
Full article ">Figure 5
<p>Attack path for full access on an SM application.</p>
Full article ">Figure 6
<p>Attack path for accessing Core Zone LAN in Aggregator.</p>
Full article ">Figure 7
<p>Attack path for DoS on SCADA Core Zone LAN.</p>
Full article ">Figure 8
<p>Alternate attack path for DoS attack on SCADA Core Zone LAN.</p>
Full article ">Figure 9
<p>Attack path for denying an RTU in a substation.</p>
Full article ">Figure 10
<p>Attack path for gaining full access on an SM application.</p>
Full article ">Figure 11
<p>Attack path for DoS on SCADA Core LAN using social engineering.</p>
Full article ">Figure 12
<p>Attack path for hardware supply chain attack on SM.</p>
Full article ">Figure 13
<p>Attack Path for Man in the Middle on an SM.</p>
Full article ">Figure 14
<p>Supply chain attack on SCADA Core Zone.</p>
Full article ">Figure 15
<p>Attack path for denying RTU in substations.</p>
Full article ">
10 pages, 1927 KiB  
Proceeding Paper
AI-Driven Vishing Attacks: A Practical Approach
by Fabricio Toapanta, Belén Rivadeneira, Christian Tipantuña and Danny Guamán
Eng. Proc. 2024, 77(1), 15; https://doi.org/10.3390/engproc2024077015 - 18 Nov 2024
Viewed by 148
Abstract
Today, there are many security problems at the technological level, especially in telecommunications. Cybercriminals invade and steal data from any system using vector attacks such as phishing through scam mail, fake websites and phone calls. This latter form of phishing is called vishing [...] Read more.
Today, there are many security problems at the technological level, especially in telecommunications. Cybercriminals invade and steal data from any system using vector attacks such as phishing through scam mail, fake websites and phone calls. This latter form of phishing is called vishing (phishing using voice). Through vishing and using social engineering techniques, attackers can impersonate family members or friends of potential victims and obtain information or money or a specific target objective. Traditionally, to carry out vishing attacks, attackers imitated the vocabulary, voice and tone of a person known to the victim. However, with current artificial intelligence (AI) tools, obtaining synthetic voices similar or identical to the person to be impersonated is more straightforward and precise. In this regard, this paper, using ChatGPT and three AI-enabled applications for voice synthesis presents a practical approach for deploying vishing attacks in an academic environment to identify the limitations, implications and possible countermeasures to mitigate the effects on Internet users. Results demonstrate the effectiveness of vishing attacks, and the maturity level of the employed AI tools. Full article
Show Figures

Figure 1

Figure 1
<p>Stages of SE attack, sources [<a href="#B11-engproc-77-00015" class="html-bibr">11</a>].</p>
Full article ">Figure 2
<p>Expressive voice cloning model: Generic TTS model, sources [<a href="#B17-engproc-77-00015" class="html-bibr">17</a>].</p>
Full article ">Figure 3
<p>Conceptual model of social engineering factors for a vishing attack, based on [<a href="#B16-engproc-77-00015" class="html-bibr">16</a>].</p>
Full article ">Figure 4
<p>Flowchart of the procedure to be followed for vishing attacks.</p>
Full article ">Figure 5
<p>Overall results of vishing attacks for each application.</p>
Full article ">
19 pages, 2662 KiB  
Article
Identifying Persons of Interest in Digital Forensics Using NLP-Based AI
by Jonathan Adkins, Ali Al Bataineh and Majd Khalaf
Future Internet 2024, 16(11), 426; https://doi.org/10.3390/fi16110426 - 18 Nov 2024
Viewed by 727
Abstract
The field of digital forensics relies on expertise from multiple domains, including computer science, criminology, and law. It also relies on different toolsets and an analyst’s expertise to parse enormous amounts of user-generated data to find clues that help crack a case. This [...] Read more.
The field of digital forensics relies on expertise from multiple domains, including computer science, criminology, and law. It also relies on different toolsets and an analyst’s expertise to parse enormous amounts of user-generated data to find clues that help crack a case. This process of investigative analysis is often done manually. Artificial Intelligence (AI) can provide practical solutions to efficiently mine enormous amounts of data to find useful patterns that can be leveraged to investigate crimes. Natural Language Processing (NLP) is a subdomain of research under AI that deals with problems involving unstructured data, specifically language. The domain of NLP includes several tools to parse text, including topic modeling, pairwise correlation, word vector cosine distance measurement, and sentiment analysis. In this research, we propose a digital forensic investigative technique that uses an ensemble of NLP tools to identify a person of interest list based on a corpus of text. Our proposed method serves as a type of human feature reduction, where a total pool of suspects is filtered down to a short list of candidates who possess a higher correlation with the crime being investigated. Full article
Show Figures

Figure 1

Figure 1
<p>Composite graph showing the agreement of four statistical algorithms on the number of topics (k).</p>
Full article ">Figure 2
<p>Process flow for identifying persons of interest using NLP techniques.</p>
Full article ">Figure 3
<p>Emotion classification results for Eva showing peaks in fear and guilt.</p>
Full article ">Figure 4
<p>Topic distribution in the dataset using pairwise correlation.</p>
Full article ">Figure 5
<p>LDA topic models displayed as plotted circles.</p>
Full article ">Figure 6
<p>Topic model graph with added clusters from pairwise correlations.</p>
Full article ">Figure 7
<p>Word embedding graph showing proximity of terms and named entities.</p>
Full article ">Figure 8
<p>Word embedding graph with related pairwise clusters.</p>
Full article ">Figure 9
<p>Summary of findings and evidence.</p>
Full article ">
15 pages, 3243 KiB  
Review
A Review of Large Language Models in Healthcare: Taxonomy, Threats, Vulnerabilities, and Framework
by Rida Hamid and Sarfraz Brohi
Big Data Cogn. Comput. 2024, 8(11), 161; https://doi.org/10.3390/bdcc8110161 - 18 Nov 2024
Viewed by 402
Abstract
Due to the widespread acceptance of ChatGPT, implementing large language models (LLMs) in real-world applications has become an important research area. Such productisation of technologies allows the public to use AI without technical knowledge. LLMs can revolutionise and automate various healthcare processes, but [...] Read more.
Due to the widespread acceptance of ChatGPT, implementing large language models (LLMs) in real-world applications has become an important research area. Such productisation of technologies allows the public to use AI without technical knowledge. LLMs can revolutionise and automate various healthcare processes, but security is critical. If implemented in critical sectors such as healthcare, adversaries can manipulate the vulnerabilities present in such systems to perform malicious activities such as data exfiltration and manipulation, and the results can be devastating. While LLM implementation in healthcare has been discussed in numerous studies, threats and vulnerabilities identification in LLMs and their safe implementation in healthcare remain largely unexplored. Based on a comprehensive review, this study provides new findings which do not exist in the current literature. This research has proposed a taxonomy to explore LLM applications in healthcare, a threat model considering the vulnerabilities of LLMs which may affect their implementation in healthcare, and a security framework for the implementation of LLMs in healthcare and has identified future avenues of research in LLMs, cybersecurity, and healthcare. Full article
(This article belongs to the Special Issue Generative AI and Large Language Models)
Show Figures

Figure 1

Figure 1
<p>Taxonomy of LLMs in healthcare.</p>
Full article ">Figure 2
<p>High-level overview of the threat model of LLMs in healthcare.</p>
Full article ">Figure 3
<p>Snapshot of a jailbreak attack on ChatGPT 3.5.</p>
Full article ">Figure 4
<p>Threats and vulnerabilities mapping of LLMs in healthcare.</p>
Full article ">Figure 5
<p>Security framework for implementing LLMs in healthcare.</p>
Full article ">
25 pages, 2987 KiB  
Article
Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work
by Syed Muhammad Zohaib, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, Muhammad Haseeb and Zia Muhammad
Information 2024, 15(11), 734; https://doi.org/10.3390/info15110734 - 17 Nov 2024
Viewed by 296
Abstract
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises [...] Read more.
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises concerns, including security threats, latency, throughput, and scalability, among others. These newer-generation threats are more complex and frequent, which makes the legacy approach to security ineffective. This research paper gives an overview of contemporary technologies used across enterprises, including the VPNs, Zero Trust Network Access (ZTNA), proxy servers, Secure Shell (SSH) tunnels, the software-defined wide area network (SD-WAN), and Secure Access Service Edge (SASE). This paper also presents a comprehensive cybersecurity framework named Zero Trust VPN (ZT-VPN), which is a VPN solution based on Zero Trust principles. The proposed framework aims to enhance IT security and privacy for modern enterprises in remote work environments and address concerns of latency, throughput, scalability, and security. Finally, this paper demonstrates the effectiveness of the proposed framework in various enterprise scenarios, highlighting its ability to prevent data leaks, manage access permissions, and provide seamless security transitions. The findings underscore the importance of adopting ZT-VPN to fortify cybersecurity frameworks, offering an effective protection tool against contemporary cyber threats. This research serves as a valuable reference for organizations aiming to enhance their security posture in an increasingly hostile threat landscape. Full article
(This article belongs to the Special Issue Feature Papers in Information in 2024–2025)
Show Figures

Figure 1

Figure 1
<p>Illustration of VPN functionality, demonstrating encrypted traffic flow for enhanced data security and user privacy across public networks.</p>
Full article ">Figure 2
<p>Zero Trust Network Access (ZTNA) framework, showing the continuous verification process that ensures secure access based on identity, context, and device compliance.</p>
Full article ">Figure 3
<p>Systematic literature review (SLR) methodology for selecting and filtering articles related to Zero Trust VPN and cybersecurity frameworks.</p>
Full article ">Figure 4
<p>Detailed architecture of the Zero Trust VPN (ZT-VPN) framework, depicting the Policy Enforcement Point, Identity Enforcement Point, and Security Enforcement Point modules for comprehensive security management.</p>
Full article ">
34 pages, 1788 KiB  
Article
Enabling Design of Secure IoT Systems with Trade-Off-Aware Architectural Tactics
by Cristian Orellana, Francisco Cereceda-Balic, Mauricio Solar and Hernán Astudillo
Sensors 2024, 24(22), 7314; https://doi.org/10.3390/s24227314 - 15 Nov 2024
Viewed by 332
Abstract
The increasing use of the Internet of Things (IoT) in homes and industry brings significant security and privacy challenges, while also considering trade-off for performance, energy consumption, and processing capabilities. Few explicit and specific guidelines exist to help architects in considering these trade-offs [...] Read more.
The increasing use of the Internet of Things (IoT) in homes and industry brings significant security and privacy challenges, while also considering trade-off for performance, energy consumption, and processing capabilities. Few explicit and specific guidelines exist to help architects in considering these trade-offs while designing secure IoT systems. This article proposes to address this situation by extending the well-known architectural tactics taxonomies with IoT-specific trade-offs; to preserving auditability, the trade-offs address the quality characteristics of the ISO 25010:2023 standard. The proposed technique and catalog are illustrated with the design of the Nunatak environmental monitoring system. The proposal was empirically validated with a controlled experiment, where a balanced mix of 12 novice and expert practitioners had to design a secure IoT Environmental Monitoring System; they used similar architectural tactics catalogs, with versus without trade-off information. Results suggest that having this information yield significant improvements in decision-making effectiveness (Precision) and usefulness (F1-Score), particularly benefiting less experienced designers. Wider adoption of trade-off-aware catalogs of architectural tactics will allow systematic, auditable design of secure IoT systems, and especially so by novice architects. Full article
(This article belongs to the Special Issue IoT Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Security tactics taxonomy.</p>
Full article ">Figure 2
<p>High-level operating model of the environmental integrated system.</p>
Full article ">Figure 3
<p>Experimental process followed in this study.</p>
Full article ">Figure 4
<p>Average performance metrics for each experimental group and clusters.</p>
Full article ">
Back to TopTop