Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
To counteract the rapidly evolving cyber threats, many research efforts have been made to design cyber threat intelligence (CTI) systems that extract CTI data from publicly available sources. Specifically, indicators of compromise (IOC)...
Organizational and team culture as antecedents of protection motivation among IT employees
The rapid development of technology and information systems has led to higher information security-related issues in an organization. The age of remote working (i.e., telecommuting) has further increased information security related ...
A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can ...
LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning
Recently, privacy-preserving machine learning (PPML) has received a lot of research attention, due to the increasing demand for multiple data owners in training machine learning models. Thus, many works have been proposed for privacy-...
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications
- Md. Mamunur Rashid,
- Joarder Kamruzzaman,
- Mohammad Mehedi Hassan,
- Tasadduq Imam,
- Santoso Wibowo,
- Steven Gordon,
- Giancarlo Fortino
Intrusion Detection Systems (IDS) based on deep learning models can identify and mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models, which support the IDS’s decision, could be vulnerable to a ...
Assessing website password practices – Unchanged after fifteen years?
Passwords continue to occupy an interesting position in cyber security, being both widely used and widely criticised at the same time. In many cases the criticism is levelled at users, who are routinely judged to be at fault for making ...
On-manifold adversarial attack based on latent space substitute model
Modern image classification networks endure adversarial attacks that deliberately alter the input image by adding small, often imperceptible, perturbations to mislead the network’s classification result. From a perspective of manifold ...
Deep learning based cross architecture internet of things malware detection and classification
The number of publicly exposed Internet of Things (IoT) devices has been increasing, as more number of these devices connected to the internet with default settings. The devices accessed with default credentials are getting compromised ...
CLICKA: Collecting and leveraging identity cues with keystroke dynamics
The way in which IT systems are usually secured is through the use of username and password pairs. However, these credentials are all too easily lost, stolen or compromised. The use of behavioural biometrics can be used to supplement ...
KPointer: Keep the code pointers on the stack point to the right code
Affected by vulnerabilities, the control data on the stack is easily destroyed, which provides the most convenient conditions for code reuse attacks (CRAs). The operating system (OS) does not impose strict restrictions on the control ...
A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
- Tomás Sureda Riera,
- Juan-Ramón Bermejo Higuera,
- Javier Bermejo Higuera,
- José-Javier Martínez Herraiz,
- Juan-Antonio Sicilia Montalvo
There are many datasets for training and evaluating models to detect web attacks, labeling each request as normal or attack. Web attack protection tools must provide additional information on the type of attack ...
MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems
The rise of malicious practice in network traffic is one of the most noticeable issues in network security. This practice is negatively impacting the productivity of various organizations and end-users. In this paper, a novel approach ...
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models
Fraud detection in bank payments transactions suffers from a high number of false positives. To deal with this problem, we introduce a rules generation framework for a fraud-detection system – an automatic rules generation using ...
Tamp-X: Attacking explainable natural language classifiers through tampered activations
- Tampering the activations of explainable natural language classifiers can fool state-of-the-art XAI methods
While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works have shown that the decisions made by DNNs cannot always ...
An internet of secure and private things: A service-oriented architecture
Low-cost networked IoT devices are fast becoming commonplace. From implanted medical devices to motion-activated surveillance cameras and from driverless smart cars to voice-operated home management systems, IoT devices continue to ...
Authenticating tier-two body area network devices through user-specific signal propagation characteristics
Wireless body area network (WBAN) plays a vital role in patient health monitoring due to its ability to measure private physiological data of patients via low-power sensor devices and send them to medical experts through wireless ...
Malware‐SMELL: A zero‐shot learning strategy for detecting zero‐day vulnerabilities
One of the most relevant security problems is inferring whether a program has malicious intent (malware software). Even though Antivirus is one of the most popular approaches for malware detection, new types of malware are released at ...
HAGDetector: Heterogeneous DGA domain name detection model
The botnet relies on the Command and Control (C&C) channels to conduct its malicious activities remotely. The Domain Generation Algorithm (DGA) is often used by botnets to hide their Command and Control (C&C) server and evade take-down ...
The cybersecurity risk estimation engine: A tool for possibility based risk analysis
Despite dramatic changes in the constellation of cybersecurity risks, the basic approach to risk calculation has been anchored to probability theory. The probability approach is widely known and conceptually simple. But it is ...
Threat classification model for security information event management focusing on model efficiency
As various types of network threats have increased recently, manual threat response by security analysts has become a limitation. To compensate for this, the importance of security information event management (SIEM), a response system ...
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection
The large body of Android malware research has demonstrated that machine learning methods can provide high performance for detecting Android malware. However, the vast majority of studies underestimate the evolving nature of the threat ...
IFAttn: Binary code similarity analysis based on interpretable features with attention
Binary code similarity analysis (BCSA BCSA: Binary Code Similarity Analysis. ) is meaningful in various software security applications, including vulnerability discovery, ...
Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network
The Fifth Generation (5G) of cellular mobile network, due its speed and flexibility, will be a preferred communication technology for future deployment of the Internet of Things (IoT). However, with the rapid growth in the number of ...
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. Reports about ...
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks
Security issues have gradually emerged with the continuous development of artificial intelligence (AI). Earlier work verified the possibility of converting neural network models into stegomalware, embedding malware into a model with ...
Improving transferability of adversarial examples by saliency distribution and data augmentation
- We propose a novel attack method to improve the transferability of targeted attacks.
Although deep neural networks (DNNs) have advanced performance in many application scenarios, they are vulnerable to the attacks of adversarial examples that are crafted by adding imperceptible perturbations. Most of the existing ...
AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks
Machine Learning-based techniques have shown success in cyber intelligence. However, they are increasingly becoming targets of sophisticated data-driven adversarial attacks resulting in misprediction, eroding their ability to detect ...
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis
Traditional malware detection methods based on static traffic characteristics and machine learning are hard to cope with the increasing number of APT malware variants. In order to alleviate this problem, this paper proposes a deep-...
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
Self-Sovereign Identity (SSI) empowers users to govern their digital identity and personal data. This approach has changed the identity paradigm where users become the central governor of their identity; hence the rapid growth of the ...