1
|
Wang Z, Ghaleb FA, Zainal A, Siraj MM, Lu X. An efficient intrusion detection model based on convolutional spiking neural network. Sci Rep 2024; 14:7054. [PMID: 38528084 DOI: 10.1038/s41598-024-57691-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2024] [Accepted: 03/20/2024] [Indexed: 03/27/2024] Open
Abstract
Many intrusion detection techniques have been developed to ensure that the target system can function properly under the established rules. With the booming Internet of Things (IoT) applications, the resource-constrained nature of its devices makes it urgent to explore lightweight and high-performance intrusion detection models. Recent years have seen a particularly active application of deep learning (DL) techniques. The spiking neural network (SNN), a type of artificial intelligence that is associated with sparse computations and inherent temporal dynamics, has been viewed as a potential candidate for the next generation of DL. It should be noted, however, that current research into SNNs has largely focused on scenarios where limited computational resources and insufficient power sources are not considered. Consequently, even state-of-the-art SNN solutions tend to be inefficient. In this paper, a lightweight and effective detection model is proposed. With the help of rational algorithm design, the model integrates the advantages of SNNs as well as convolutional neural networks (CNNs). In addition to reducing resource usage, it maintains a high level of classification accuracy. The proposed model was evaluated against some current state-of-the-art models using a comprehensive set of metrics. Based on the experimental results, the model demonstrated improved adaptability to environments with limited computational resources and energy sources.
Collapse
Affiliation(s)
- Zhen Wang
- Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, 81310, Johor, Malaysia
- School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, Zhejiang, China
| | - Fuad A Ghaleb
- College of Computing and Digital Technology, Birmingham City University, Birmingham, B47XG, United Kingdom
| | - Anazida Zainal
- Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, 81310, Johor, Malaysia
| | - Maheyzah Md Siraj
- Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, 81310, Johor, Malaysia
| | - Xing Lu
- School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, Zhejiang, China.
| |
Collapse
|
2
|
Naqvi SSA, Li Y, Uzair M. DDoS attack detection in smart grid network using reconstructive machine learning models. PeerJ Comput Sci 2024; 10:e1784. [PMID: 38259891 PMCID: PMC10803083 DOI: 10.7717/peerj-cs.1784] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/22/2023] [Accepted: 12/07/2023] [Indexed: 01/24/2024]
Abstract
Network attacks pose a significant challenge for smart grid networks, mainly due to the existence of several multi-directional communication devices coupling consumers to the grid. One of the network attacks that can affect the smart grid is the distributed denial of service (DDoS), where numerous compromised communication devices/nodes of the grid flood the smart grid network with false data and requests, leading to disruptions in smart meters, data servers, and the state estimator, ultimately effecting the services for end-users. Machine learning-based strategies show distinctive benefits in resolving the challenge of securing the network from DDoS attacks. Regardless, a notable hindrance in deploying machine learning-based techniques is the requirement of model retraining whenever new attack classes arise. Practically, disrupting the normal operations of smart grid is really discouraged. To handle this challenge effectively and detect DDoS attacks without major disruptions, we propose the deployment of reconstructive deep learning techniques. A primary benefit of our proposed technique is the minimum disruption during the introduction of a new attack class, even after complete deployment. We trained several deep and shallow reconstructive models to get representations for each attack type separately, and we performed attack detection by class-specific reconstruction error-based classification. Our technique experienced rigid evaluation via multiple experiments using two well-acknowledged standard databases exclusively for DDoS attacks, including their subsets. Later, we performed a comparative estimation of our outcomes against six methods prevalent within the same domain. Our outcomes reveal that our technique attained higher accuracy, and notably eliminates the requirement of a complete model retraining in the event of the introduction of new attack classes. This method will not only boost the security of smart grid networks but also ensure the stability and reliability of normal operations, protecting the critical infrastructure from ever-evolving network attacks. As smart grid is advancing rapidly, our approach proposes a robust and adaptive way to overcome the continuous challenges posed by network attacks.
Collapse
Affiliation(s)
- Sardar Shan Ali Naqvi
- School of Control and Computer Engineering, North China Electric Power University, Beijing, China
| | - Yuancheng Li
- School of Control and Computer Engineering, North China Electric Power University, Beijing, China
| | - Muhammad Uzair
- Department of Computer Engineering, COMSATS Institute Of Information Technology, Wah cantt, Pakistan
| |
Collapse
|
3
|
Meiseles A, Motro Y, Rokach L, Moran-Gilad J. Vulnerability of pangolin SARS-CoV-2 lineage assignment to adversarial attack. Artif Intell Med 2023; 146:102722. [PMID: 38042605 DOI: 10.1016/j.artmed.2023.102722] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/23/2022] [Revised: 11/14/2023] [Accepted: 11/14/2023] [Indexed: 12/04/2023]
Abstract
Pangolin is the most popular tool for SARS-CoV-2 lineage assignment. During COVID-19, healthcare professionals and policymakers required accurate and timely lineage assignment of SARS-CoV-2 genomes for pandemic response. Therefore, tools such as Pangolin use a machine learning model, pangoLEARN, for fast and accurate lineage assignment. Unfortunately, machine learning models are susceptible to adversarial attacks, in which minute changes to the inputs cause substantial changes in the model prediction. We present an attack that uses the pangoLEARN architecture to find perturbations that change the lineage assignment, often with only 2-3 base pair changes. The attacks we carried out show that pangolin is vulnerable to adversarial attack, with success rates between 0.98 and 1 for sequences from non-VoC lineages when pangoLEARN is used for lineage assignment. The attacks we carried out are almost never successful against VoC lineages because pangolin uses Usher and Scorpio - the non-machine-learning alternative methods for VoC lineage assignment. A malicious agent could use the proposed attack to fake or mask outbreaks or circulating lineages. Developers of software in the field of microbial genomics should be aware of the vulnerabilities of machine learning based models and mitigate such risks.
Collapse
Affiliation(s)
- Amiel Meiseles
- Dept. of Software and Information Systems Engineering, Ben Gurion University of the Negev, Beer Sheva, Israel
| | - Yair Motro
- Dept. of Health Policy and Management, School of Public Health, Faculty of Health Sciences, Ben Gurion University of the Negev, Beer Sheva, Israel
| | - Lior Rokach
- Dept. of Software and Information Systems Engineering, Ben Gurion University of the Negev, Beer Sheva, Israel
| | - Jacob Moran-Gilad
- Dept. of Health Policy and Management, School of Public Health, Faculty of Health Sciences, Ben Gurion University of the Negev, Beer Sheva, Israel.
| |
Collapse
|
4
|
Kamerer JL, McDermott DS. Cyber hygiene concepts for nursing education. Nurse Educ Today 2023; 130:105940. [PMID: 37595324 DOI: 10.1016/j.nedt.2023.105940] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/21/2023] [Revised: 07/24/2023] [Accepted: 08/10/2023] [Indexed: 08/20/2023]
Abstract
BACKGROUND The healthcare industry has increasingly been targeted by cybercrime putting patients, organizations, and employees at risk for financial loss and breach of privacy. Malware events compromise system integrity and patient privacy which could lead to delays in treatment, loss of patient data, inability to provide care, and increase in patient harm. In addition, these attacks may also compromise private and personal information for those targeted. OBJECTIVE Nurses represent a large portion of frontline healthcare workers and are uniquely positioned to help prevent cyber-attacks. Nursing curriculum should include education about the risks to patient safety from cybercrime and the nurse's role in preventing cybercrime. Nursing education has focused on hygiene for patient safety. Adding cyber hygiene to the essential practices of pre-licensure and advanced practice nurses is a first step to protecting patients, organizations, and employees from the repercussions of a healthcare cyber-attack.
Collapse
Affiliation(s)
- Jessica L Kamerer
- Robert Morris University School of Nursing, Education & Human Studies, 6001 University Blvd., Moon Township, PA 15108 United States
| | - Donna S McDermott
- University of South Florida College of Nursing, 12901 Bruce B. Downs Blvd., Tampa, FL 33612, United States.
| |
Collapse
|
5
|
Chen M, Yan M. How to protect smart and autonomous vehicles from stealth viruses and worms. ISA Trans 2023; 141:52-58. [PMID: 37217376 DOI: 10.1016/j.isatra.2023.04.019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2022] [Revised: 04/06/2023] [Accepted: 04/14/2023] [Indexed: 05/24/2023]
Abstract
Smart and autonomous vehicles are inseparable parts of the future Intelligent Transportation Systems (ITS). However, ITS components, and especially its vehicles, are prone to cyber threats. Interconnectivity of different parts, ranging from in-vehicle communication of different modules to vehicle and vehicle to infrastructure message exchanges open a window to the cyber attacks launched through these communication media. This paper introduces the concept of stealth virus or worm in smart and autonomous vehicles which can jeopardize the safety of passengers. Stealth attacks are designed to manipulate a system in a way that while the changes are not detectable by human, the system is negatively influenced over the time. A framework for Intrusion Detection System (IDS) is proposed afterward. The proposed IDS structure is scalable and easily deployable on current and future vehicles which are equipped with Controller Area Network (CAN) buses. Through a case study on car cruise control, a new stealth attack is presented. The attack is analytically discussed first. Then, it is shown how the proposed IDS can detect this kind of threats.
Collapse
Affiliation(s)
| | - Minrui Yan
- Swinburne University of Technology, Melbourne, Australia.
| |
Collapse
|
6
|
Ahmed RN, Javed A, Bedewi W. Is COVID-19 Being Used to Spread Malware. SN Comput Sci 2023; 4:398. [PMID: 37220558 PMCID: PMC10189705 DOI: 10.1007/s42979-023-01838-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/14/2022] [Accepted: 01/27/2023] [Indexed: 05/25/2023]
Abstract
With the rising number of people using social networks after the pandemic of COVID-19, cybercriminals took the advantage of (i) the increased base of possible victims and (ii) the use of a trending topic as the pandemic COVID-19 to lure victims and attract their attention and put malicious content to infect the most possible number of people. Twitter platform forces an auto-shortening to any included URL within a 140-character message called "tweet" and this makes it easier for the attackers to include malicious URLs within Tweets. Here comes the need to adopt new approaches to resolve the problem or at least identify it to better understand it to find a suitable solution. One of the proven effective approaches is the adaption of machine learning (ML) concepts and applying different algorithms to detect, identify, and even block the propagation of malware. Hence, this study's main objectives were to collect tweets from Twitter that are related to the topic of COVID-19 and extract features from these tweets and import them as independent variables for the machine learning models to be developed later, so they would identify imported tweets as to be malicious or not.
Collapse
Affiliation(s)
- Ruqayah N. Ahmed
- Computer Center, University of Samarra, Samarra, Salah Aldin 34010 Iraq
- School of Computer Science and Informatics, Cardiff University, Cathays, Cardiff, CF24 4AG UK
| | - Amir Javed
- School of Computer Science and Informatics, Cardiff University, Cathays, Cardiff, CF24 4AG UK
- Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589 Saudi Arabia
| | - Wafi Bedewi
- Computer Center, University of Samarra, Samarra, Salah Aldin 34010 Iraq
- School of Computer Science and Informatics, Cardiff University, Cathays, Cardiff, CF24 4AG UK
| |
Collapse
|
7
|
Marazqah Btoush EAL, Zhou X, Gururajan R, Chan KC, Genrich R, Sankaran P. A systematic review of literature on credit card cyber fraud detection using machine and deep learning. PeerJ Comput Sci 2023; 9:e1278. [PMID: 37346569 PMCID: PMC10280638 DOI: 10.7717/peerj-cs.1278] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/28/2022] [Accepted: 02/15/2023] [Indexed: 06/23/2023]
Abstract
The increasing spread of cyberattacks and crimes makes cyber security a top priority in the banking industry. Credit card cyber fraud is a major security risk worldwide. Conventional anomaly detection and rule-based techniques are two of the most common utilized approaches for detecting cyber fraud, however, they are the most time-consuming, resource-intensive, and inaccurate. Machine learning is one of the techniques gaining popularity and playing a significant role in this field. This study examines and synthesizes previous studies on the credit card cyber fraud detection. This review focuses specifically on exploring machine learning/deep learning approaches. In our review, we identified 181 research articles, published from 2019 to 2021. For the benefit of researchers, review of machine learning/deep learning techniques and their relevance in credit card cyber fraud detection is presented. Our review provides direction for choosing the most suitable techniques. This review also discusses the major problems, gaps, and limits in detecting cyber fraud in credit card and recommend research directions for the future. This comprehensive review enables researchers and banking industry to conduct innovation projects for cyber fraud detection.
Collapse
Affiliation(s)
| | - Xujuan Zhou
- School of Business, University of Southern Queensland, Toowoomba, QLD, Australia
| | - Raj Gururajan
- School of Business, University of Southern Queensland, Toowoomba, QLD, Australia
- School of Computing, SRM Institute of Science and Technology, Chennai, India
| | - Ka Ching Chan
- School of Business, University of Southern Queensland, Toowoomba, QLD, Australia
| | - Rohan Genrich
- School of Business, University of Southern Queensland, Toowoomba, QLD, Australia
| | - Prema Sankaran
- School of Management, Presidency University, Bangalore, India
| |
Collapse
|
8
|
Xu T, Singh K, Rajivan P. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Appl Ergon 2023; 108:103908. [PMID: 36403509 DOI: 10.1016/j.apergo.2022.103908] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/09/2022] [Revised: 06/10/2022] [Accepted: 09/20/2022] [Indexed: 06/16/2023]
Abstract
Many cyberattacks begin with a malicious email message, known as spear phishing, targeted at unsuspecting victims. Although security technologies have improved significantly in recent years, spear phishing continues to be successful due to the bespoke nature of such attacks. Crafting such emails requires attackers to conduct careful research about their victims and collect personal information about them and their acquaintances. Despite the widespread nature of spear-phishing attacks, little is understood about the human factors behind them. This is particularly the case when considering the role of attack personalization on end-user vulnerability. To study spear-phishing attacks in the laboratory, we developed a simulation environment called SpearSim that simulates the tasks involved in the generation and reception of spear-phishing messages. Using SpearSim, we conducted a laboratory experiment with human subjects to study the effect of information availability and information exploitation end-user vulnerability. The results of the experiment show that end-users in the high information-availability condition were 2.97 times more vulnerable to spear-phishing attacks than those in the low information-availability condition. We found that access to more personal information about targets can result in attacks involving contextually meaningful impersonation and narratives. We discuss the implications of this research for the design of anti-phishing training solutions.
Collapse
Affiliation(s)
- Tianhao Xu
- University of Washington, Department of Industrial and System Engineering, United States
| | - Kuldeep Singh
- The University of Texas at El Paso, Department of Computer Science, United States
| | - Prashanth Rajivan
- University of Washington, Department of Industrial and System Engineering, United States.
| |
Collapse
|
9
|
Yadav A, Kumar A, Singh V. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. Artif Intell Rev 2023; 56:1-32. [PMID: 37362900 PMCID: PMC10014398 DOI: 10.1007/s10462-023-10454-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/17/2023]
Abstract
The volume of data generated by today's digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.
Collapse
Affiliation(s)
- Ashok Yadav
- Department of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, Uttar Pradesh 211015 India
| | - Atul Kumar
- Data Security Council of India, New Delhi, 110025 India
| | - Vrijendra Singh
- Department of Information Technology, Indian Institute of Information Technology Allahabad, Prayagraj, Uttar Pradesh 211015 India
| |
Collapse
|
10
|
Abstract
With the origin of smart homes, smart cities, and smart everything, smart phones came up as an area of magnificent growth and development. These devices became a part of daily activities of human life. This impact and growth have made these devices more vulnerable to attacks than other devices such as desktops or laptops. Text messages or SMS (Short Text Messages) are a part of smartphones through which attackers target the users. Smishing (SMS Phishing) is an attack targeting smartphone users through the medium of text messages. Though smishing is a type of phishing, it is different from phishing in many aspects like the amount of information available in the SMS, the strategy of attack, etc. Thus, detection of smishing is a challenge in the context of the minimum amount of information shared by the attacker. In the case of smishing, we have short text messages which are often in short forms or in symbolic forms. A single text message contains very few smishing-related features, and it consists of abbreviations and idioms which makes smishing detection more difficult. Detection of smishing is a challenge not only because of features constraint but also due to the scarcity of real smishing datasets. To differentiate spam messages from smishing messages, we are evaluating the legitimacy of the URL (Uniform Resource Locator) in the message. We have extracted the five most efficient features from the text messages to enable the machine learning classification using a limited number of features. In this paper, we have presented a smishing detection model comprising of two phases, Domain Checking Phase and SMS Classification Phase. We have examined the authenticity of the URL in the SMS which is a crucial part of SMS phishing detection. In our system, Domain Checking Phase scrutinizes the authenticity of the URL. SMS Classification Phase examines the text contents of the messages and extracts some efficient features. Finally, the system classifies the messages using Backpropagation Algorithm and compares results with three traditional classifiers. A prototype of the system has been developed and evaluated using SMS datasets. The results of the evaluation achieved an accuracy of 97.93% which shows the proposed method is very efficient for the detection of smishing messages.
Collapse
|
11
|
Dart M, Ahmed M. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. Digit Health 2023; 9:20552076231191095. [PMID: 37533776 PMCID: PMC10392183 DOI: 10.1177/20552076231191095] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/17/2023] [Accepted: 07/13/2023] [Indexed: 08/04/2023] Open
Abstract
Purpose This paper proposes a novel cyber security risk governance framework and ontology for large Australian healthcare providers, using the structure and simplicity of the Unified Modelling Language (UML). This framework is intended to mitigate impacts from the risk areas of: (1) cyber-attacks, (2) incidents, (3) data breaches, and (4) data disclosures. Methods Using a mixed-methods approach comprised of empirical evidence discovery and phenomenological review, existing literature is sourced to confirm baseline ontological definitions. These are supplemented with Australian government reports, professional standards publications and legislation covering cyber security, data breach reporting and healthcare governance. Historical examples of healthcare cyber security incidents are reviewed, and a cyber risk governance UML presented to manage the defined problem areas via a single, simplified ontological diagram. Results A clear definition of 'cyber security' is generated, along with the 'CYBER-AIDD' risk model. Specific examples of cyber security incidents impacting Australian healthcare are confirmed as N = 929 over 5 years, with human factors the largest contributor. The CYBER-AIDD UML model presents a workflow across four defined classes, providing a clear approach to implementing the controls required to mitigate risks against verified threats. Conclusions The governance of cyber security in healthcare is complex, in part due to a lack of clarity around key terms and risks, and this is contributing to consistently poor operational outcomes. A focus on the most essential avenues of risk, using a simple UML model, is beneficial in describing these risks and designing governance controls around them.
Collapse
Affiliation(s)
- Martin Dart
- School of Science, Edith Cowan University, Joondalup, WA, Australia
| | - Mohiuddin Ahmed
- School of Science, Edith Cowan University, Joondalup, WA, Australia
| |
Collapse
|
12
|
Hurrah NN, Khan E, Khan U. CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare. J Ambient Intell Humaniz Comput 2022; 14:2631-2643. [PMID: 36590234 PMCID: PMC9791968 DOI: 10.1007/s12652-022-04510-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/21/2022] [Accepted: 12/13/2022] [Indexed: 06/17/2023]
Abstract
In the present E-healthcare industry, data breaches result in substantial economic losses due to cyber-attacks and hence create a trust deficit between the industry and users. The healthcare industry has rapidly adopted IoT frameworks but the trust deficit and privacy concerns limit its utilization among the masses. Along with privacy protection, content authentication is an important requirement in a number of critical applications and fragile watermarking provides an effective solution. However, existing fragile watermarking techniques lack the accuracy of tamper detection and hence are not reliable enough in terms of security and privacy of the data. This paper presents a novel low-complexity block-based fragile watermarking technique with high security against cyber-security attacks. This is achieved by embedding a fragile watermark in the host image using pixel domain blocking approach. The security of embedded watermark has been taken care of by using Cellular Automata and DNA based ENcryption (CADEN) framework to scramble the watermark bits using various secret keys. Experimental investigations show that besides being highly secure, the proposed technique is fragile to various signal processing and geometric attacks. The comparative analysis shows that the proposed scheme, despite having lower complexity, offers better efficiency in terms of imperceptibility, tamper detection and localization compared to other state-of-the-art techniques. Besides, the fragile watermark embedding makes the system capable to preserve the secret information in case of an attack with an average BER of 40%.
Collapse
Affiliation(s)
- Nasir N. Hurrah
- Department of Electronics Engineering, Aligarh Muslim University, Aligarh, UP India
| | - Ekram Khan
- Department of Electronics Engineering, Aligarh Muslim University, Aligarh, UP India
| | - Uzma Khan
- Department of Higher Education, Srinagar, J&K India
| |
Collapse
|
13
|
Sendelj R, Ognjanovic I. Cybersecurity Challenges in Healthcare. Stud Health Technol Inform 2022; 300:190-202. [PMID: 36300412 DOI: 10.3233/shti220951] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/16/2023]
Abstract
Cyber security attacks evidence has shown that many sectors and industries are still at an insufficient level of readiness to counter these threats, including healthcare organizations and the entire healthcare industry. The COVID-19 pandemic has additionally launched the issue of cyber protection of healthcare systems and connected medical and other devices as well as modern IT components, which are often the entry point for attackers against healthcare organizations. With the aim of a systematic approach to cyber security in healthcare organizations, this article comprehensively presents cyber risks and possible consequences of attacks in the context of healthcare organization services, as well as identifies the five most important cyber security challenges and provides recommendations for establishing protection mechanisms in line with best practices.
Collapse
Affiliation(s)
- Ramo Sendelj
- University of Donja Gorica, Oktoih 1, 81000 Podgorica, Montenegro
| | - Ivana Ognjanovic
- University of Donja Gorica, Oktoih 1, 81000 Podgorica, Montenegro
| |
Collapse
|
14
|
Catal C, Ozcan A, Donmez E, Kasif A. Analysis of cyber security knowledge gaps based on cyber security body of knowledge. Educ Inf Technol (Dordr) 2022; 28:1809-1831. [PMID: 35967829 PMCID: PMC9362361 DOI: 10.1007/s10639-022-11261-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/09/2021] [Accepted: 07/22/2022] [Indexed: 06/15/2023]
Abstract
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an opinion survey by using the Cyber Security Knowledge Areas (KAs) specified in the Cyber Security Body of Knowledge (CyBOK) that comprises 19 KAs. Our data was gathered from practitioners who work in cyber security organizations. The knowledge gap was measured and evaluated by acknowledging the assumption for employing sequent data as nominal data and improved it by deploying chi-squared test. Analyses demonstrate that there is a gap that can be utilized to enhance the quality of education. According to acquired final results, three key KAs with the highest knowledge gap are Web and Mobile Security, Security Operations and Incident Management. Also, Cyber-Physical Systems (CPS), Software Lifecycles, and Vulnerabilities are the knowledge areas with largest difference in perception of importance between less and more experienced personnel. We discuss several suggestions to improve the cyber security curriculum in order to minimize the knowledge gaps. There is an expanding demand for executive cyber security personnel in industry. High-quality university education is required to improve the qualification of upcoming workforce. The capability and capacity of the national cyber security workforce is crucial for nations and security organizations. A wide range of skills, namely technical skills, implementation skills, management skills, and soft skills are required in new cyber security graduates. The use of each CyBOK KA in the industry was measured in response to the extent of learning in university environments. This is the first study conducted in this field, it is considered that this research can inspire the way for further researches.
Collapse
Affiliation(s)
- Cagatay Catal
- Department of Computer Science and Engineering, Qatar University, Doha, Qatar
| | - Alper Ozcan
- Department of Computer Engineering, Akdeniz University, Antalya, Turkey
| | - Emrah Donmez
- Department of Software Engineering, Bandirma Onyedi Eylul University, Balikesir, Turkey
| | - Ahmet Kasif
- Department of Computer Engineering, Bursa Technical University, Bursa, Turkey
| |
Collapse
|
15
|
Abstract
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose a new attacker model, based on dynamic optimization, where we demonstrate that large, initial, fixed costs of exploit development induce attackers to delay implementation and deployment of exploits of vulnerabilities. The theoretical model predicts that mass attackers will preferably (i) exploit only one vulnerability per software version, (ii) largely include only vulnerabilities requiring low attack complexity, and (iii) be slow at trying to weaponize new vulnerabilities . These predictions are empirically validated on a large data set of observed massed attacks launched against a large collection of information systems. Findings in this article allow cyber risk managers to better concentrate their efforts for vulnerability management, and set a new theoretical and empirical basis for further research defining attacker (offensive) processes.
Collapse
Affiliation(s)
- Luca Allodi
- Technical University of EindhovenGroene Loper 5EindhovenThe Netherlands
| | - Fabio Massacci
- University of TrentoVia Sommarive 9Povo (Trento)Italy
- Vrije Universiteit AmsterdamDe Boelelaan 1111AmsterdamThe Netherlands
| | | |
Collapse
|
16
|
Mishra S, Soni D. Implementation of 'Smishing Detector': An Efficient Model for Smishing Detection Using Neural Network. SN Comput Sci 2022; 3:189. [PMID: 35308803 PMCID: PMC8923090 DOI: 10.1007/s42979-022-01078-0] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/15/2021] [Accepted: 02/19/2022] [Indexed: 06/14/2023]
Abstract
Neural network creates a neuron-based network similar to the human nervous system to solve classification problems efficiently. The smishing problem is a binary classification problem in which attackers target smartphone users through text messages. As smishing is a remarkable cybersecurity issue that is troubling researchers and smartphone users these days. Addressing this security issue using the most efficient algorithm is the need of the hour. This manuscript presented an algorithm for the model proposed by authors in 'Smishing Detector' model and implemented it using Neural Network. The result obtained proves that the neural network is much efficient in detecting smishing problem. Neural Network outperformed other machine learning algorithms with a difference of 1.11%. Neural Network performed with the final accuracy of 97.40%. In this paper, system extracted the most efficient features of smishing SMS (Short Message Service) using the Neural Network. This manuscript also reported the accuracy shown by the system for each feature selected and implemented. It is evident from the implementation that each feature selected is most effective in smishing detection and URL (Uniform Resource Locator) feature is the most effective feature with an accuracy of 94%.
Collapse
Affiliation(s)
- Sandhya Mishra
- Department of Computer Science & Engineering and Information Technology, Jaypee Institute of Information Technology, Sector-128, Noida, India
| | - Devpriya Soni
- Department of Computer Science & Engineering and Information Technology, Jaypee Institute of Information Technology, Sector-128, Noida, India
| |
Collapse
|
17
|
Abstract
Deception technologies, and honeypots in particular, have been used for decades to understand how cyber attacks and attackers work. A myriad of factors impact the effectiveness of a honeypot. However, very few is known about the impact of the geographical location of honeypots on the amount and type of attacks. Hornet 40 is the first dataset designed to help understand how the geolocation of honeypots may impact the inflow of network attacks. The data consists of network flows in binary and text format, with up to 118 features, including 480 bytes of the content of each flow. They were created using the Argus flow collector. The passive honeypots are IP addresses connected to the Internet and do not have any honeypot software running, so attacks are not interactive. The data was collected from identically configured honeypot servers in eight locations: Amsterdam, Bangalore, Frankfurt, London, New York, San Francisco, Singapore, and Toronto. The dataset contains over 4.7 million network flows collected during forty days throughout April, May, and June 2021.
Collapse
Affiliation(s)
- Veronica Valeros
- Artificial Intelligence Center, Department of Computer Science, FEL, Czech Technical University in Prague, Czech Republic
| | - Sebastian Garcia
- Artificial Intelligence Center, Department of Computer Science, FEL, Czech Technical University in Prague, Czech Republic
| |
Collapse
|
18
|
Mughaid A, AlZu’bi S, Hnaif A, Taamneh S, Alnajjar A, Elsoud EA. An intelligent cyber security phishing detection system using deep learning techniques. Cluster Comput 2022; 25:3819-3828. [PMID: 35602317 PMCID: PMC9107003 DOI: 10.1007/s10586-022-03604-4] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/17/2021] [Revised: 04/20/2022] [Accepted: 04/22/2022] [Indexed: 05/13/2023]
Abstract
Recently, phishing attacks have become one of the most prominent social engineering attacks faced by public internet users, governments, and businesses. In response to this threat, this paper proposes to give a complete vision to what Machine learning is, what phishers are using to trick gullible users with different types of phishing attacks techniques and based on our survey that phishing emails is the most effective on the targeted sectors and users which we are going to compare as well. Therefore, more effective phishing detection technology is needed to curb the threat of phishing emails that are growing at an alarming rate in recent years, thus will discuss the techniques of mitigation of phishing by Machine learning algorithms and technical solutions that have been proposed to mitigate the problem of phishing and valuable awareness knowledge users should be aware to detect and prevent from being duped by phishing scams. In this work, we proposed a detection model using machine learning techniques by splitting the dataset to train the detection model and validating the results using the test data , to capture inherent characteristics of the email text, and other features to be classified as phishing or non-phishing using three different data sets, After making a comparison between them, we obtained that the most number of features used the most accurate and efficient results achieved. the best ML algorithm accuracy were 0.88, 1.00, and 0.97 consecutively for boosted decision tree on the applied data sets.
Collapse
Affiliation(s)
- Ala Mughaid
- Department of Information Technology, Faculty of prince Al-Hussien bin Abdullah for IT, The Hashemite University, P.O. Box 330127, 13133 Zarqa, Jordan
| | - Shadi AlZu’bi
- Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman, Jordan
| | - Adnan Hnaif
- Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman, Jordan
| | - Salah Taamneh
- Department of Information Technology, Faculty of prince Al-Hussien bin Abdullah for IT, The Hashemite University, P.O. Box 330127, 13133 Zarqa, Jordan
| | - Asma Alnajjar
- Department of Information Technology, Faculty of prince Al-Hussien bin Abdullah for IT, The Hashemite University, P.O. Box 330127, 13133 Zarqa, Jordan
| | - Esraa Abu Elsoud
- Department of Information Technology, Faculty of prince Al-Hussien bin Abdullah for IT, The Hashemite University, P.O. Box 330127, 13133 Zarqa, Jordan
| |
Collapse
|
19
|
Rosati P, Lynn T. A dataset for accounting, finance and economics research on US data breaches. Data Brief 2021; 35:106924. [PMID: 33748365 PMCID: PMC7966974 DOI: 10.1016/j.dib.2021.106924] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/03/2020] [Revised: 02/24/2021] [Accepted: 02/26/2021] [Indexed: 12/01/2022] Open
Abstract
This data article describes a dataset of data breaches in US listed firms over a ten-year period. Data breaches represent major events that pose serious challenges to organisations. The number of incidents has been on the increase over the last decade and this has attracted the interest of the media, consumers and regulators. While there is a well-established literature on cybersecurity in Computer Science and Information Systems journals, studies exploring the economic and business impacts of data breaches represent a relatively recent phenomenon. There is a nascent but fast-growing literature in accounting, finance and economics that focuses on the financial impacts of data breaches and this dataset provides a useful resource for future studies in this space. By providing data on the company identifier, the type of breach, the dates of breach disclosure, and relates these dates to the company's fiscal year, the dataset can be merged quickly with existing accounting and finance datasets. The dataset includes data on 506 incidents over a ten-year period thereby enabling cross-sectional and longitudinal analyses.
Collapse
Affiliation(s)
- Pierangelo Rosati
- Irish Institute of Digital Business, Dublin City University, Ireland
| | - Theo Lynn
- Irish Institute of Digital Business, Dublin City University, Ireland
| |
Collapse
|
20
|
Ko I, Chambers D, Barrett E. Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain. INT J MACH LEARN CYB 2021;:1-23. [PMID: 33786073 DOI: 10.1007/s13042-021-01306-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/20/2020] [Accepted: 03/10/2021] [Indexed: 10/29/2022]
Abstract
The continuous advancement of DDoS attack technology and an increasing number of IoT devices connected on 5G networks escalate the level of difficulty for DDoS mitigation. A growing number of researchers have started to utilise Deep Learning algorithms to improve the performance of DDoS mitigation systems. Real DDoS attack data has no labels, and hence, we present an intelligent attack mitigation (IAM) system, which takes an ensemble approach by employing Recurrent Autonomous Autoencoders (RAA) as basic learners with a majority voting scheme. The RAA is a target-driven, distributionenabled, and imbalanced clustering algorithm, which is designed to work with the ISP's blackholing mechanism for DDoS flood attack mitigation. It can dynamically select features, decide a reference target (RT), and determine an optimal threshold to classify network traffic. A novel Comparison-Max Random Walk algorithm is used to determine the RT, which is used as an instrument to direct the model to classify the data so that the predicted positives are close or equal to the RT. We also propose Estimated Evaluation Metrics (EEM) to evaluate the performance of unsupervised models. The IAM system is tested with UDP flood, TCP flood, ICMP flood, multi-vector and a real UDP flood attack data. Additionally, to check the scalability of the IAM system, we tested it on every subdivided data set for distributed computing. The average Recall on all data sets was above 98%.
Collapse
|
21
|
Venturi A, Apruzzese G, Andreolini M, Colajanni M, Marchetti M. DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems. Data Brief 2021; 34:106631. [PMID: 33365367 PMCID: PMC7749366 DOI: 10.1016/j.dib.2020.106631] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/21/2020] [Revised: 12/02/2020] [Accepted: 12/03/2020] [Indexed: 11/28/2022] Open
Abstract
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet detectors against adversarial attacks. This dataset includes realistic adversarial samples that are generated by leveraging two widely used Deep Reinforcement Learning (DRL) techniques. These adversarial samples are proved to evade state of the art detectors based on Machine- and Deep-Learning algorithms. The initial corpus of malicious samples consists of network flows belonging to different botnet families presented in three public datasets containing real enterprise network traffic. We use these datasets to devise detectors capable of achieving state-of-the-art performance. We then train two DRL agents, based on Double Deep Q-Network and Deep Sarsa, to generate realistic adversarial samples: the goal is achieving misclassifications by performing small modifications to the initial malicious samples. These alterations involve the features that can be more realistically altered by an expert attacker, and do not compromise the underlying malicious logic of the original samples. Our dataset represents an important contribution to the cybersecurity research community as it is the first including thousands of automatically generated adversarial samples that are able to thwart state of the art classifiers with a high evasion rate. The adversarial samples are grouped by malware variant and provided in a CSV file format. Researchers can validate their defensive proposals by testing their detectors against the adversarial samples of the proposed dataset. Moreover, the analysis of these samples can pave the way to a deeper comprehension of adversarial attacks and to some sort of explainability of machine learning defensive algorithms. They can also support the definition of novel effective defensive techniques.
Collapse
Affiliation(s)
- Andrea Venturi
- Department of Engineering “Enzo Ferrari”, University of Modena and Reggio Emilia, Italy
| | - Giovanni Apruzzese
- Hilti Chair of Data and Application Security, University of Liechtenstein, Vaduz, Liechtenstein
| | - Mauro Andreolini
- Department of Physics, Computer Science and Mathematics, University of Modena and Reggio Emilia, Italy
| | - Michele Colajanni
- Department of Informatics, Science and Engineering, University of Bologna, Italy
| | - Mirco Marchetti
- Department of Engineering “Enzo Ferrari”, University of Modena and Reggio Emilia, Italy
| |
Collapse
|
22
|
Husák M, Žádník M, Bartoš V, Sokol P. Dataset of intrusion detection alerts from a sharing platform. Data Brief 2020; 33:106530. [PMID: 33299907 DOI: 10.1016/j.dib.2020.106530] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/13/2020] [Revised: 11/03/2020] [Accepted: 11/09/2020] [Indexed: 11/24/2022] Open
Abstract
The dataset contains intrusion detection alerts obtained via an alert sharing platform (SABU) for one week. A plethora of heterogeneous intrusion detection systems deployed across several organizations contributed to the sharing platform. The alerts are stored in the intrusion Detection Extensible Alert (IDEA) format and categorized using the eCSIRT.net Incident Taxonomy. Dataset can be used in several areas of cybersecurity research for the analysis of intrusion detection alerts including temporal and spatial correlations, reputation scoring, attack scenario reconstruction, and attack projection. The network identifiers (e.g., IP addresses, hostnames) are anonymized. However, the list of interesting features (e.g., presence on blacklists, geolocation) of such entities at the time of data collection is provided.
Collapse
|
23
|
Wurmb T, Kippnich M, Schwarzmann G, Mehlhase J, Valotis A, Firnkes T, Braungardt J, Ertl G. [Complete information technology blackout in hospitals : Development of a concept for maintaining patient care]. Unfallchirurg 2020; 123:443-452. [PMID: 32270220 DOI: 10.1007/s00113-020-00797-4] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
Abstract
The complete blackout of information technology (IT) in a hospital represents a major incident with acute loss of functionality. The immediate consequence is a rapidly progressive loss of treatment capacity. The major priority for the acute management of such an event is to keep patients safe and prevent life-threatening situations. A possibility to channel the uncontrolled loss of treatment capacity in order to achieve the aforementioned protective target is the immediate organization of an analog system for baseline emergency medical care. The switch over from a fully operational routinely functioning system to a reduced emergency state occurs daily in hospitals (night shift, weekends, public holidays) and reflects the controlled reduction of the treatment capacity. This process and the procedures associated with it are universally known, the functions are clearly defined and planned in advance by duty rotas and the interplay of clinics in the organizational schedule is regulated in detail. In order to accomplish this strategy analog instruments are necessary. These must all be conceived, established, practiced and evaluated in advance with the clinics and departments. Ultimately, all isolated IT blackout concepts must be amalgamated into a compatible and functioning total framework. This structure must be maintained for as long as a partially or totally functioning IT has been reinstated.
Collapse
Affiliation(s)
- T Wurmb
- Sektion Notfall- und Katastrophenmedizin der Klinik und Poliklinik für Anästhesiologie, Universitätsklinikum Würzburg, Oberdürrbacherstraße 6, 97080, Würzburg, Deutschland.
- Deutsche Arbeitsgemeinschaft Krankenhaus Einsatzplanung, DAKEP e. V., Köln, Deutschland.
| | - M Kippnich
- Sektion Notfall- und Katastrophenmedizin der Klinik und Poliklinik für Anästhesiologie, Universitätsklinikum Würzburg, Oberdürrbacherstraße 6, 97080, Würzburg, Deutschland
| | - G Schwarzmann
- Stabsstelle Qualitätsmanagement, Universitätsklinikum Würzburg, Würzburg, Deutschland
| | - J Mehlhase
- Servicezentrum Medizin-Informatik, Universitätsklinikum Würzburg, Würzburg, Deutschland
| | - A Valotis
- Stabsstelle Medizinsicherheit, Universitätsklinikum Würzburg, Würzburg, Deutschland
| | - T Firnkes
- Geschäftsbereich Logistik, Einkauf und Liegenschaften, Universitätsklinikum Würzburg, Würzburg, Deutschland
| | - J Braungardt
- Geschäftsbereich Technik und Bau, Universitätsklinikum Würzburg, Würzburg, Deutschland
| | - G Ertl
- Universitätsklinikum Würzburg, Würzburg, Deutschland
| |
Collapse
|
24
|
Bhuyan SS, Kabir UY, Escareno JM, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. J Med Syst 2020; 44:98. [PMID: 32239357 DOI: 10.1007/s10916-019-1507-y] [Citation(s) in RCA: 33] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/31/2018] [Accepted: 11/14/2019] [Indexed: 11/25/2022]
Abstract
The recent rise in cybersecurity breaches in healthcare organizations has put patients' privacy at a higher risk of being exposed. Despite this threat and the additional danger posed by such incidents to patients' safety, as well as operational and financial threats to healthcare organizations, very few studies have systematically examined the cybersecurity threats in healthcare. To lay a firm foundation for healthcare organizations and policymakers in better understanding the complexity of the issue of cybersecurity, this study explores the major type of cybersecurity threats for healthcare organizations and explains the roles of the four major players (cyber attackers, cyber defenders, developers, and end-users) in cybersecurity. Finally, the paper discusses a set of recommendations for the policymakers and healthcare organizations to strengthen cybersecurity in their organization.
Collapse
Affiliation(s)
- Soumitra Sudip Bhuyan
- Rutgers Urban and Civic Informatics Lab, Edward J. Bloustein School of Planning and Public Policy, Rutgers University, New Brunswick, NJ, 07920, USA.
| | - Umar Y Kabir
- School of Public Health, The University of Memphis, Memphis, TN, 38152, USA
| | - Jessica M Escareno
- School of Public Health, The University of Memphis, Memphis, TN, 38152, USA
| | - Kenya Ector
- School of Public Health, The University of Memphis, Memphis, TN, 38152, USA
| | | | - David Wyant
- Jack C. Massey Graduate School of Business, Belmont University, Nashville, TN, 37212, USA
| | - Sajeesh Kumar
- Health Info & Info Management, University of Tennessee Health Sciences Center, Memphis, TN, 38104, USA
| | - Marian Levy
- School of Public Health, The University of Memphis, Memphis, TN, 38152, USA
| | - Satish Kedia
- School of Public Health, The University of Memphis, Memphis, TN, 38152, USA
| | - Dipankar Dasgupta
- Department of Computer Science, The University of Memphis, Memphis, TN, 38152, USA
| | - Aram Dobalian
- School of Public Health, The University of Memphis, Memphis, TN, 38152, USA
| |
Collapse
|
25
|
Venter IM, Blignaut RJ, Renaud K, Venter MA. Cyber security education is as essential as "the three R's". Heliyon 2019; 5:e02855. [PMID: 31872107 PMCID: PMC6909085 DOI: 10.1016/j.heliyon.2019.e02855] [Citation(s) in RCA: 20] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/24/2019] [Revised: 08/11/2019] [Accepted: 11/13/2019] [Indexed: 11/30/2022] Open
Abstract
Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use. That being so, it is important to ensure that all South Africans know how to secure their smart devices. Doing so requires a high level of security awareness and knowledge. As yet, there is no formal curriculum addressing cyber security in South African schools. Indeed, it seems to be left to universities to teach cyber security principles, and they currently only do this when students take computing-related courses. The outcome of this approach is that only a very small percentage of South Africans, i.e. those who take computing courses at university, are made aware of cyber security risks and know how to take precautions. In this paper we found that, because this group is overwhelmingly male, this educational strategy disproportionately leaves young South African women vulnerable to cyber-attacks. We thus contend that cyber security ought to be taught as children learn the essential “3 Rs”—delivering requisite skills at University level does not adequately prepare young South Africans for a world where cyber security is an essential skill. Starting to provide awareness and knowledge at primary school, and embedding it across the curriculum would, in addition to ensuring that people have the skills when they need them, also remove the current gender imbalance in cyber security awareness.
Collapse
Affiliation(s)
| | | | - Karen Renaud
- Abertay University, Dundee, Scotland, UK.,Rhodes University, Grahamstown, South Africa.,University of South Africa, South Africa
| | | |
Collapse
|
26
|
Tschakert KF, Ngamsuriyaroj S. Effectiveness of and user preferences for security awareness training methodologies. Heliyon 2019; 5:e02010. [PMID: 31338464 PMCID: PMC6606995 DOI: 10.1016/j.heliyon.2019.e02010] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/19/2019] [Revised: 05/24/2019] [Accepted: 06/11/2019] [Indexed: 10/26/2022] Open
Abstract
Phishing is a primary vector used in cyber-attacks, and current technical measures are not sufficient to reduce their success to an acceptable level. Empowering users to identify phishing emails is crucial; thus, anti-phishing training is essential. We investigate participant phishing susceptibility in a 2 × 2 mixed factorial design to determine if instructor-led classroom training, in addition to a multiple approach video-, game-, and text-based training package, offers a significant difference in susceptibility reduction compared with the absence of classroom training. The results suggest an insignificant improvement in reducing phishing susceptibility by incorporating classroom training. Furthermore, we observe a significant preference from the participants for one training method (i.e., classroom training) only if a decision for one particular method was required.
Collapse
|
27
|
Vidhyapriya R, Lovelyn Rose S. Personal Authentication Mechanism Based on Finger Knuckle Print. J Med Syst 2019; 43:232. [PMID: 31203468 DOI: 10.1007/s10916-019-1332-3] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/19/2019] [Accepted: 05/08/2019] [Indexed: 10/26/2022]
Abstract
For authentication purposes, the identification and verification of a user is done by biometric traits like finger print, face, iris and gait, etc. Among the various traits finger print is mostly used in commercial applications for recognizing user's identity. The other hand based modalities such as vein, and finger knuckle are gaining importance. This paper proposes a methodology for secure biometrics authentication using Finger Knuckle Print (FKP). The texture patterns from finger knuckle are extracted using Gabor with Exception-Maximization (EM) algorithm and the feature vectors from these texture patterns are acquired using Scale Invariant Feature Transform (SIFT) algorithm. The main focus is to reduce the false rejection rate without increasing the false acceptance rate and to improve the performance over the conventional hand based modalities. The performance is compared with Genuine Acceptance Rate (GAR) and False Rejection Rate (FRR). One of the advantages of FKP authentication is its user friendliness in data collection.
Collapse
|
28
|
Bustard JD. Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security. Sci Eng Ethics 2018; 24:683-698. [PMID: 28401507 PMCID: PMC5876413 DOI: 10.1007/s11948-017-9904-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/29/2016] [Accepted: 03/19/2017] [Indexed: 06/07/2023]
Abstract
In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master's module in Ethical and Legal Issues in Cyber Security at Queens University Belfast. One significant aspect of the resulting design is that it encourages students to see ethical issues in systemic terms rather than from an individual perspective, with issues emerging from a conflict between different groups with different vested interests. Case studies are used to examine how personal and business priorities create conflicts that can lead to negative press, fines and punitive legal action. The module explores the reasons why organisations may be unaware of the risks associated with their actions and how an inappropriate response to an ethical issue can significantly aggravate a situation. The module has been delivered in three successive years since 2014 and been well received on each occasion. The paper describes the design of the module and the experience of delivering it, concluding with a discussion of the effectiveness of the approach.
Collapse
Affiliation(s)
- John D Bustard
- School of Electronics, Electrical Engineering and Computer Science, Queen's University, Belfast, BT9 5AH, UK.
| |
Collapse
|
29
|
Zhao W, Yang MQ. Dependability enhancing mechanisms for integrated clinical environments. J Supercomput 2017; 73:4207-4220. [PMID: 29081597 PMCID: PMC5657604 DOI: 10.1007/s11227-017-2003-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
Abstract
In this article, we present a set of lightweight mechanisms to enhance the dependability of a safety-critical real-time distributed system referred to as an integrated clinical environment (ICE). In an ICE, medical devices are interconnected and work together with the help of a supervisory computer system to enhance patient safety during clinical operations. Inevitably, there are strong dependability requirements on the ICE. We introduce a set of mechanisms that essentially make the supervisor component a trusted computing base, which can withstand common hardware failures and malicious attacks. The mechanisms rely on the replication of the supervisor component and employ only one input-exchange phase into the critical path of the operation of the ICE. Our analysis shows that the runtime latency overhead is much lower than that of traditional approaches.
Collapse
Affiliation(s)
- Wenbing Zhao
- Department of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH 44115 USA
| | - Mary Q. Yang
- Department of Information Science, George Washington Donaghey College of Engineering and Information Technology, Little Rock, AR USA
- Joint Bioinformatics Program of University of Arkansas at Little Rock, University of Arkansas for Medical Sciences, 2801 S. University Avenue, Little Rock, AR 72204 USA
| |
Collapse
|
30
|
Pieters W, Hadžiosmanović D, Dechesne F. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Sci Eng Ethics 2016; 22:831-850. [PMID: 25896029 PMCID: PMC4912578 DOI: 10.1007/s11948-015-9648-y] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/22/2014] [Accepted: 03/31/2015] [Indexed: 06/01/2023]
Abstract
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.
Collapse
Affiliation(s)
- Wolter Pieters
- />Delft University of Technology, CyberSecurity@TUDelft, P.O. Box 5015, 2600 GA Delft, The Netherlands
- />University of Twente, Services, Cybersecurity and Safety, P.O. Box 217, 7500 AE Enschede, The Netherlands
| | - Dina Hadžiosmanović
- />Delft University of Technology, CyberSecurity@TUDelft, P.O. Box 5015, 2600 GA Delft, The Netherlands
| | - Francien Dechesne
- />3TU.Ethics @ Eindhoven, Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven, The Netherlands
| |
Collapse
|
31
|
Frommholz I, Al-Khateeb HM, Potthast M, Ghasem Z, Shukla M, Short E. On Textual Analysis and Machine Learning for Cyberstalking Detection. Datenbank Spektrum 2016; 16:127-135. [PMID: 29368749 PMCID: PMC5750836 DOI: 10.1007/s13222-016-0221-x] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/01/2016] [Accepted: 04/21/2016] [Indexed: 11/28/2022]
Abstract
Cyber security has become a major concern for users and businesses alike. Cyberstalking and harassment have been identified as a growing anti-social problem. Besides detecting cyberstalking and harassment, there is the need to gather digital evidence, often by the victim. To this end, we provide an overview of and discuss relevant technological means, in particular coming from text analytics as well as machine learning, that are capable to address the above challenges. We present a framework for the detection of text-based cyberstalking and the role and challenges of some core techniques such as author identification, text classification and personalisation. We then discuss PAN, a network and evaluation initiative that focusses on digital text forensics, in particular author identification.
Collapse
Affiliation(s)
- Ingo Frommholz
- The National Centre for Cyberstalking Research, Institute for Research in Applicable Computing, University of Bedfordshire, Luton, UK
| | - Haider M Al-Khateeb
- The National Centre for Cyberstalking Research, Institute for Research in Applicable Computing, University of Bedfordshire, Luton, UK
| | - Martin Potthast
- Web Technology and Information Systems, Bauhaus-Universität Weimar, Weimar, Germany
| | - Zinnar Ghasem
- The National Centre for Cyberstalking Research, Institute for Research in Applicable Computing, University of Bedfordshire, Luton, UK
| | - Mitul Shukla
- The National Centre for Cyberstalking Research, Institute for Research in Applicable Computing, University of Bedfordshire, Luton, UK
| | - Emma Short
- The National Centre for Cyberstalking Research, Institute for Research in Applicable Computing, University of Bedfordshire, Luton, UK
| |
Collapse
|
32
|
Ashok A, Hahn A, Govindarasu M. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment. J Adv Res 2014; 5:481-9. [PMID: 25685516 DOI: 10.1016/j.jare.2013.12.005] [Citation(s) in RCA: 75] [Impact Index Per Article: 6.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/21/2013] [Revised: 11/28/2013] [Accepted: 12/10/2013] [Indexed: 11/20/2022] Open
Abstract
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
Collapse
|