Sort by
Cryptography in Secure Cloud Computing
Janaka Senarathna,
Janaka Senarathna
Posted: 16 April 2025
HBSP: A Lightweight Framework for Transparent Software Protection Using Hardware Virtualization
Niketa Penumajji
Posted: 03 April 2025
Standardized Evaluation of Counter-drone Systems: Methods, Technologies, and Performance Metrics
Geert De Cubber,
Daniela Doroftei,
Paraskevi Petsioti,
Alexios Koniaris,
Konrad Brewczyński,
Marek Życzkowski,
Razvan Roman,
Silviu Sima,
Ali Mohamoud,
Johan van de Pol
Posted: 26 March 2025
Identity and Access Management (IAM) Authentication Methods: Importance of Multi-Factor Authentication (MFA) and Single Sign-On (SSO) and Access Control Models
Samson Ojo,
Allan covey
Posted: 25 March 2025
Investigation into Online Banking and its Prevailing Fraud Factors: A Comprehensive Analysis
Richard Kalu
Posted: 24 March 2025
Probabilistic Measurement of CTI Quality for Large Numbers of Unstructured CTI Products
Georgios Sakellariou,
Menelaos Katsantonis,
Panagiotis Fouliras
Posted: 18 March 2025
A Survey on Privacy Preservation Techniques in IoT Systems
Rupinder Kaur,
Tiago Rodrigues,
Nourin Kadir,
Rasha Kashef
Posted: 13 March 2025
Enhancing Financial Predictions Based on Bitcoin Prices Using Big Data and Deep Learning Approach
Samon Daniel
Posted: 13 March 2025
GenXSS: an AI-Driven Framework for Automated Detection of XSS Attacks in WAFs
Vahid Babaey,
Arun Ravindran
Posted: 05 March 2025
Detecting Zero-Day Web Attacks Using One-Class Ensemble Classifiers
Vahid Babaey,
Hamid Reza Faragardi
Posted: 04 March 2025
A Novel Secure Prescription System
Savina Mariettou,
Constantinos Koutsojannis,
Vassilis Triantafyllou
This research presents a novel system for monitoring antibiotic consumption, address-ing the critical need for transparency and accuracy in data management within healthcare settings. The objective is to enhance the monitoring process while ensuring robust security measures. The system’s user interface was developed using HyperText Markup Language (HTML) and Cascading Style Sheets (CSS), with Hypertext Prepro-cessor (PHP) managing database interactions and overall functionality. Security pro-tocols implemented include Transport Layer Security (TLS) 1.3 and 1.2 with Forward Secrecy (FS) to guarantee secure communications. A validation mechanism enforces the use of Hypertext Transfer Protocol Secure (HTTPS) across all URLs, complemented by a 256-bit Elliptic Curve Cryptography (ECC) Secure Sockets Layer (SSL) certificate. The effectiveness of these security measures was evaluated through tests simulating unauthorized access, Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), and SQL injection attacks, demonstrating the system’s resilience against various cyber threats. Furthermore, integrating machine learning techniques in Python is proposed to enhance the detection capabilities against SQL injection, thereby fortifying system security. Ultimately, this system aims to optimize hospital resource management, en-suring accurate monitoring of antibiotic consumption and contributing to sustainable healthcare practices.
This research presents a novel system for monitoring antibiotic consumption, address-ing the critical need for transparency and accuracy in data management within healthcare settings. The objective is to enhance the monitoring process while ensuring robust security measures. The system’s user interface was developed using HyperText Markup Language (HTML) and Cascading Style Sheets (CSS), with Hypertext Prepro-cessor (PHP) managing database interactions and overall functionality. Security pro-tocols implemented include Transport Layer Security (TLS) 1.3 and 1.2 with Forward Secrecy (FS) to guarantee secure communications. A validation mechanism enforces the use of Hypertext Transfer Protocol Secure (HTTPS) across all URLs, complemented by a 256-bit Elliptic Curve Cryptography (ECC) Secure Sockets Layer (SSL) certificate. The effectiveness of these security measures was evaluated through tests simulating unauthorized access, Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), and SQL injection attacks, demonstrating the system’s resilience against various cyber threats. Furthermore, integrating machine learning techniques in Python is proposed to enhance the detection capabilities against SQL injection, thereby fortifying system security. Ultimately, this system aims to optimize hospital resource management, en-suring accurate monitoring of antibiotic consumption and contributing to sustainable healthcare practices.
Posted: 28 February 2025
C3: Leveraging the Native Messaging API for Covert Command and Control
Efstratios Chatzoglou,
Georgios Kambourakis
Posted: 28 February 2025
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels
Anastasios N. Bikos
Virtual Reality (VR)/Metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes is of paramount importance. Securely transferring the same secret key, i.e., obfuscated, between several parties is the main issue with symmetric cryptography, the workhorse of modern cryptography because of its ease of use and quick speed. Typically, asymmetric cryptography establishes a shared secret between parties, after which the switch to symmetric encryption can be made. However, several SoTA (State-of-The-Art) security research schemes lack flexibility and scalability for industrial Internet of Things (IoT)-sized applications. In this paper, we present the full architecture of the PRIVocular framework. PRIVocular (i.e., PRIV(acy)-ocular) is a VR-ready hardware-software integrated system that is capable of visually transmitting user data over three versatile modes of encapsulation, encrypted –without loss of generality– using an asymmetric-key cryptosystem. These operation modes can be Optical Characters-based or QR-tag-based. Encryption and decryption primarily depend on each mode’s success ratio of correct encoding-decoding. We investigate the most efficient means of ocular (encrypted) data transfer by considering several designs and contributing to each framework component. Our pre-prototyped framework can provide such privacy preservation (namely virtual proof of privacy (VPP)) and visually secure data transfer promptly (<1000 msec), as well as the physical distance of the smart glasses (∼50 cm).
Virtual Reality (VR)/Metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes is of paramount importance. Securely transferring the same secret key, i.e., obfuscated, between several parties is the main issue with symmetric cryptography, the workhorse of modern cryptography because of its ease of use and quick speed. Typically, asymmetric cryptography establishes a shared secret between parties, after which the switch to symmetric encryption can be made. However, several SoTA (State-of-The-Art) security research schemes lack flexibility and scalability for industrial Internet of Things (IoT)-sized applications. In this paper, we present the full architecture of the PRIVocular framework. PRIVocular (i.e., PRIV(acy)-ocular) is a VR-ready hardware-software integrated system that is capable of visually transmitting user data over three versatile modes of encapsulation, encrypted –without loss of generality– using an asymmetric-key cryptosystem. These operation modes can be Optical Characters-based or QR-tag-based. Encryption and decryption primarily depend on each mode’s success ratio of correct encoding-decoding. We investigate the most efficient means of ocular (encrypted) data transfer by considering several designs and contributing to each framework component. Our pre-prototyped framework can provide such privacy preservation (namely virtual proof of privacy (VPP)) and visually secure data transfer promptly (<1000 msec), as well as the physical distance of the smart glasses (∼50 cm).
Posted: 25 February 2025
Intention Recognition for Digital Forensics: A Formal Model
Yidnekachew Worku Kassa,
Joshua Isaac James,
Elefelious Getachew Belay
Posted: 11 February 2025
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
Mohamed Chahine Ghanem,
Eduardo Almeida Palmieri,
Wiktor Sowinski-Mydlarz,
Dipo Dunsin,
Sahar Al-Sudani
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital forensic investigators due to their diverse architectures, communication protocols, and security vulnerabilities. This research paper presents a case study focusing on the forensic investigation of an IoT device, specifically a Raspberry Pi configured with Kali Linux as a hacker machine. The study aims to highlight differences and challenges in investigating weaponised IoT as well as establish a comprehensive methodology for analysing IoT devices involved in cyber incidents. The investigation begins with the acquisition of digital evidence from the Raspberry Pi device, including volatile memory and disc images. Various forensic tools and utilities are utilised to extract and analyse data, such as Exterro FTK and Magnet AXIOM, as well as open-source tools like Volatility, Wireshark, and Autopsy. The analysis involves examining system artefacts, logfiles, installed applications, and network connections to reconstruct the device's activity and identify potential evidence proving that the user perpetrated security breaches or malicious activities. The research results help improve IoT forensics by showing the best ways to look at IoT devices, especially those that are set up to be hacker machines. The case study demonstrates how the research results are helping to improve IoT forensic capabilities by showing the best ways to look at IoT devices, especially those that have been set up as hacker machines. The case study shows how forensic methods can be applied in IoT settings. It helps in creating guidelines, standards, and training for those who work as IoT forensic investigators. In the end, improving forensic readiness in IoT deployments is needed to keep essentials safe from cyber threats, keep digital evidence safe, and keep IoT ecosystems running smoothly, which protects the integrity of IoT ecosystems.
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital forensic investigators due to their diverse architectures, communication protocols, and security vulnerabilities. This research paper presents a case study focusing on the forensic investigation of an IoT device, specifically a Raspberry Pi configured with Kali Linux as a hacker machine. The study aims to highlight differences and challenges in investigating weaponised IoT as well as establish a comprehensive methodology for analysing IoT devices involved in cyber incidents. The investigation begins with the acquisition of digital evidence from the Raspberry Pi device, including volatile memory and disc images. Various forensic tools and utilities are utilised to extract and analyse data, such as Exterro FTK and Magnet AXIOM, as well as open-source tools like Volatility, Wireshark, and Autopsy. The analysis involves examining system artefacts, logfiles, installed applications, and network connections to reconstruct the device's activity and identify potential evidence proving that the user perpetrated security breaches or malicious activities. The research results help improve IoT forensics by showing the best ways to look at IoT devices, especially those that are set up to be hacker machines. The case study demonstrates how the research results are helping to improve IoT forensic capabilities by showing the best ways to look at IoT devices, especially those that have been set up as hacker machines. The case study shows how forensic methods can be applied in IoT settings. It helps in creating guidelines, standards, and training for those who work as IoT forensic investigators. In the end, improving forensic readiness in IoT deployments is needed to keep essentials safe from cyber threats, keep digital evidence safe, and keep IoT ecosystems running smoothly, which protects the integrity of IoT ecosystems.
Posted: 10 February 2025
PFMeta-IDS: Personalized Federated Meta-Learning Automotive Intrusion Detection System with Collaboratively Adaptive and Learnable
Hong-Quan Wang,
Jin Li,
Yao-Dong Tao
The increasing connectivity of vehicular networks has introduced significant security challenges, particularly in safeguarding the Controller Area Network (CAN) from cyberattacks. While the CAN protocol enables efficient and low-latency data communication, its lack of built-in security mechanisms leaves it vulnerable to various attacks. Existing intrusion detection systems (IDSs) often rely on large, static datasets and centralized training, limiting their adaptability to dynamic attack scenarios and raising concerns about data privacy. To address these limitations, this work introduces PFMeta-IDS, a personalized federated meta-learning intrusion detection system. In PFMeta-IDS, the FedSWR algorithm employs similarity-weighted aggregation to balance personalization and generalization. The LDwCBN network enhances computational efficiency through the model lightweight method, ensuring suitability for resource-constrained environments. Evaluated on the Car-Hacking dataset, PFMeta-IDS achieves F1-scores of 0.98 for DoS attacks, 0.94 for Fuzzy attacks, 0,98 for Gear Spoofing attacks, and 1.00 for RPM Spoofing attacks. These results outperform or match state-of-the-art methods. Notably, these results were achieved in local clients with low training data volumes, showcasing the system’s ability to adapt quickly while preserving data privacy. The robustness and efficiency of PFMeta-IDS make it a scalable solution for vehicular network security.
The increasing connectivity of vehicular networks has introduced significant security challenges, particularly in safeguarding the Controller Area Network (CAN) from cyberattacks. While the CAN protocol enables efficient and low-latency data communication, its lack of built-in security mechanisms leaves it vulnerable to various attacks. Existing intrusion detection systems (IDSs) often rely on large, static datasets and centralized training, limiting their adaptability to dynamic attack scenarios and raising concerns about data privacy. To address these limitations, this work introduces PFMeta-IDS, a personalized federated meta-learning intrusion detection system. In PFMeta-IDS, the FedSWR algorithm employs similarity-weighted aggregation to balance personalization and generalization. The LDwCBN network enhances computational efficiency through the model lightweight method, ensuring suitability for resource-constrained environments. Evaluated on the Car-Hacking dataset, PFMeta-IDS achieves F1-scores of 0.98 for DoS attacks, 0.94 for Fuzzy attacks, 0,98 for Gear Spoofing attacks, and 1.00 for RPM Spoofing attacks. These results outperform or match state-of-the-art methods. Notably, these results were achieved in local clients with low training data volumes, showcasing the system’s ability to adapt quickly while preserving data privacy. The robustness and efficiency of PFMeta-IDS make it a scalable solution for vehicular network security.
Posted: 03 February 2025
Matching TCP Packets for Stepping-Stone Intrusion Detection Resistant to Intruders’ Chaff-Perturbation
Lixin Wang,
Jianhua Yang,
Kondwani Mphande,
Yi Zhou
Posted: 28 January 2025
Privacy-Preserving Data Analytics in 5G-Enabled IoT for the Financial Industry
Wang Wayz
Posted: 27 January 2025
Enabling Collaborative Forensic-by-Design for the Internet of Vehicles
Ahmed M. Elmisery,
Mirela Sertovic
Posted: 27 January 2025
Vector Map Encryption Method Based on Secret Sharing
Fanshuo Liu,
Baiyan Wu,
Xi Liu,
Zixuan Bu,
Haodong Zhang
Posted: 20 January 2025
of 13