Filters








163 Hits in 7.2 sec

XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions [article]

Gautam Srivastava, Rutvij H Jhaveri, Sweta Bhattacharya, Sharnil Pandya, Rajeswari, Praveen Kumar Reddy Maddikunta, Gokul Yenduri, Jon G. Hall, Mamoun Alazab, Thippa Reddy Gadekallu
2022 arXiv   pre-print
The use of XAI has immense potential in predicting such attacks. The paper provides a brief overview on cybersecurity and the various forms of attack.  ...  Then the use of traditional AI techniques and its associated challenges are discussed which opens its doors towards use of XAI in various applications.  ...  There are a variety of Man-in-the-middle attacks. (1) ARP Cache Poisoning: ARP poisoning attack, also known as ARP spoofing attack, is a type of MITM attack which allows attackers to intercept communication  ... 
arXiv:2206.03585v1 fatcat:qe2d33ujdzbapczhefs2whbnwe

INTERNET OF THINGS AND THE MAN-IN-THE-MIDDLE ATTACKS – SECURITY AND ECONOMIC RISKS

Zoran Čekerevac, Zdenek Dvorak, Ludmila Prigoda, Petar Čekerevac
2017 MEST Journal  
In the continuation, based on data available, an analysis of MITM attacks is given from an economic point of view.  ...  The next chapters show the technology of MITM attacks and benefits that a successful attack provides to attackers.  ...  If yes, it uploads its status. To target such an application, attackers can perform an MITM attack. They can redirect network traffic using ARP poisoning or by DNS settings modifying.  ... 
doi:10.12709/mest.05.05.02.03 fatcat:y5r2nmvr2vdglctpupwbqmg2zu

A hands-on modular laboratory environment to foster learning in control system security

Pallavi P. Deshmukh, Cameron D. Patterson, William T. Baumann
2016 2016 IEEE Frontiers in Education Conference (FIE)  
Furthermore, recent attacks like the Stuxnet worm have demonstrated the weaknesses of CPS security, which has prompted increased effort to develop more effective security mechanisms.  ...  A mock testbed environment is created using commercial-off-the-shelf hardware to address the unique aspects of a CPS, and serve as a cybersecurity trainer for students from control system or IT backgrounds  ...  Also, it explores the different versions of SSH protocol and illustrates how an adversary can use ARP poisoning combined with a protocol downgrade attack to sniff SSH credentials. 1 . 1 Replay attack  ... 
doi:10.1109/fie.2016.7757669 dblp:conf/fie/DeshmukhPB16 fatcat:jtypcpldgvd5hjlyfa5pis4qo4

Understanding the security of interoperable medical devices using attack graphs

Curtis R. Taylor, Krishna Venkatasubramanian, Craig A. Shue
2014 Proceedings of the 3rd international conference on High confidence networked systems - HiCoNS '14  
Medical device interoperability is an increasingly prevalent example of how computing and information technology will revolutionize and streamline medical care.  ...  Security for medical devices has gained some traction in the recent years following some well-publicized attacks on individual devices, such as pacemakers and insulin pumps.  ...  We consider this analysis as a step towards building an effective architecture for secure interoperable medical devices that expands on the ICE standard.  ... 
doi:10.1145/2566468.2566482 dblp:conf/hicons/TaylorVS14 fatcat:cejkjkvw2jgalfvdz5ujgehpwm

SDN Security Review: Threat Taxonomy, Implications, and Open Challenges

Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Senthil Kumar Jagatheesaperumal, Moussa Ayyash, Maliha Shaheed
2022 IEEE Access  
On the one hand, SDN has provided solutions for high-demand resources, managing unpredictable data traffic patterns, and rapid network reconfiguration.  ...  INDEX TERMS Software defined networks, OpenFlow, security, threat, attack, vulnerability, network security. • Discussion of the future research directions and open challenges hindering resiliency and security  ...  Based on the assessment, the results concluded that relying on userspace increases the latency with fewer samples than the kernel space. For the examination of LFA in SDN, Khan et al.  ... 
doi:10.1109/access.2022.3168972 fatcat:wdjp2kzohjbhvefsjebln2buly

Multi-Source Multi-Domain Data Fusion for Cyberattack Detection in Power Systems

Abhijeet Sahu, Zeyu Mao, Patrick Wlazlo, Hao Huang, Katherine Davis, Ana Goulart, Saman Zonouz.
2021 IEEE Access  
For example, a classifier detecting an ARP spoof attack will trigger an ARP-tables based filtering in the firewall to regulate ARP cache poisoning traffic from the intruder. IX.  ...  In this current work, MiTM using ARP spoofing is focussed. ARP spoofing or poisoning is a type of attack in which an adversary sends false ARP messages over a LAN.  ... 
doi:10.1109/access.2021.3106873 fatcat:4aemwsqnunhvpavu426fzkvhg4

Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1—A New IoT Dataset

Zhipeng Liu, Niraj Thapa, Addison Shaver, Kaushik Roy, Madhuri Siddula, Xiaohong Yuan, Anna Yu
2021 Sensors  
); (2) we propose a hybrid lightweight form of IDS—an embedded model (EM) for feature selection and a convolutional neural network (CNN) for attack detection and classification.  ...  An intrusion detection system (IDS) is the most viable solution that mitigates the threats of cyberattacks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21144834 fatcat:bszezvdebvd4xivpnfu2czns3u

A Survey on Adversarial Attack in the Age of Artificial Intelligence

Zixiao Kong, Jingfeng Xue, Yong Wang, Lu Huang, Zequn Niu, Feng Li, Weizhi Meng
2021 Wireless Communications and Mobile Computing  
Facing the increasingly complex neural network model, this paper focuses on the fields of image, text, and malicious code and focuses on the adversarial attack classifications and methods of these three  ...  research line for elaboration. Firstly, we explain the significance of adversarial attack. Then, we introduce the concepts, types, and hazards of adversarial attack.  ...  Conflicts of Interest The authors declare that there is no conflict of interest regarding the publication of this paper.  ... 
doi:10.1155/2021/4907754 fatcat:rm6xcf6ryrh6ngro4sl5ifprgy

Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey

Hui Wu, Haiting Han, Xiao Wang, Shengli Sun
2020 IEEE Access  
It should be noted that although AI provides many new capabilities for the security protection of IoT, it also brings new potential challenges and possible negative effects to IoT in terms of data, algorithm  ...  Through three development routes of authentication, communication, and computing, the Internet of Things (IoT) has become a variety of innovative integrated solutions for specific applications.  ...  CONCLUSION The research of this paper proves that AI is feasible for the security of IoT, especially for the four key risks: device authentication, DoS / DDoS attack defense, intrusion detection and malware  ... 
doi:10.1109/access.2020.3018170 fatcat:gkyd77l66fbhdnq6lvkicqjdpm

A Survey on Security Attacks with Remote Ground Robots

Batuhan ÖZDOL, Elif KÖSELER, Ezgi ALÇİÇEK, Süha Eren CESUR, Perif Jan AYDEMİR, Şerif BAHTİYAR
2021 El-Cezeri: Journal of Science and Engineering  
In this paper, several cyber-attacks on Ehealth systems are explored. Particularly, we have focused on attacks to IoT based wearable health devices for body area networks.  ...  One of the main contributions of the paper is to present cyber-attacks on wearable e-health devices with ground robots.  ...  In this case, Address Resolution Protocol (ARP) poisoning, Domain Name System (DNS) poisoning, or side-jacking attacks for session stealing are possible.  ... 
doi:10.31202/ecjse.916532 fatcat:zh6avv42cfgjjlipycjtm4x2gu

A Systematic Literature Review on the Cyber Security

Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal
2021 International Journal of Scientific Research and Management  
Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  ...  Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout  ...  Threat hunting, threat intelligence, security monitoring, incident analysis, and incident response are all part of MDR's advanced security solution.  ... 
doi:10.18535/ijsrm/v9i12.ec04 fatcat:bxrsidjhpngdxgllk5cpomoyxa

Security Enhancement Against Insiders in Cyber-Manufacturing Systems

Jinwoo Song, Young Moon
2020 Procedia Manufacturing  
This paper presents a system architecture of an applied blockchain in Cyber-Manufacturing System, where the input data for PLC is stored and retrieved through the blockchain.  ...  This paper presents a system architecture of an applied blockchain in Cyber-Manufacturing System, where the input data for PLC is stored and retrieved through the blockchain.  ...  Acknowledgements The authors thank Harika Bandaru for technical assistance.  ... 
doi:10.1016/j.promfg.2020.05.124 fatcat:kmkzyreps5fcvepevzalxhhp6e

Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation

Derya Betul Unsal, Taha Selim Ustun, S. M. Suhail Hussain, Ahmet Onen
2021 Energies  
Finally, impacts on smart grid operation and current challenges are presented for future research directions.  ...  Relevant standardization and mitigation efforts are discussed in detail and then the classification of different cyber-attacks in smart grid domain with special focus on false data injection (FDI) attack  ...  MitM attacks are most commonly carried out by taking advantage of the Address Resolution Protocol (ARP) and changing the MAC address information expressed as ARP poisoning.  ... 
doi:10.3390/en14092657 doaj:03eacdede5334708b849696c510e060c fatcat:id4jsl26prdrvnttd76aka3yiu

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
This paper presents an overview of cloud architecture and categorises potential state-of-the-art security events based on their occurrence at different cloud deployment models.  ...  Moreover, the ability to detect such malicious attacks is critical for conducting necessary mitigation, at an early stage, to minimise the impact of disruption and restore cloud operations and their live  ...  Attacks include: DoS, ARP poisoning, MAC floods and unwanted cross-talk between containerised systems [31] , [54] - [57] .  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

Security Threats and Artificial Intelligence based Countermeasures for Internet of Things Networks: A Comprehensive Survey

Shakila Zaman, Khaled Alhazmi, Mohammed Aseeri, Muhammad Raisuddin Ahmed, Risala Tasin Khan, M. Shamim Kaiser, Mufti Mahmud
2021 IEEE Access  
[120] build an IDS using various ML classification algorithms like NB, SVM, DT, Adaboost to detect MITM attack, which was performed in the proposed network through ARP poisoning.  ...  Poisoning attacks occur when an intruder injects false training sample to an ML algorithm for taking a wrong decision. Sagduyu et al.  ...  For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/  ... 
doi:10.1109/access.2021.3089681 fatcat:fatpywnjzzfilidakyduz6qz44
« Previous Showing results 1 — 15 out of 163 results