Filters








1,658 Hits in 7.5 sec

Cybersecurity Becomes Smart Using Artificial Intelligent and Machine Learning Approaches: An Overview

Siham Hamadah, Darah Aqel
2020 Innovative Computing Information and Control Express Letters, Part B: Applications  
Recently, researchers are developing systems based on Artificial Intelligence (AI) and machine learning to create defense approaches and protect data with high level of security and less cost.  ...  Moreover, the world is facing Internet of Things devices which generate large volumes of data that cause a lot of new cyber threats.  ...  We would like to express our special thanks to Al Zaytoonah University of Jordan for the effort that it provides to us for supporting this research paper.  ... 
doi:10.24507/icicelb.11.12.1115 fatcat:45af2dgufjcejjmw5kro6yrc5e

Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings

Ricardo M. Czekster, Roberto Metere, Charles Morisset
2022 Applied Sciences  
In such a context, security analysis would benefit from collection of cyber threat intelligence (CTI).  ...  To facilitate the analysis, we provide a base active building model in STIX in the tool cyberaCTIve that handles complex models.  ...  Cyber Threat Intelligence and Active Buildings Threat intelligence is knowledge collected with the purpose of responding to incidents due to malicious adversaries (our focus), hazards, or faults.  ... 
doi:10.3390/app12105005 fatcat:ovgoyxodrze7tdugohcyl7wzne

Automatic Investigation Framework for Android Malware Cyber-Infrastructures [article]

ElMouatez Billah Karbab, Mouarad Debbabi
2018 arXiv   pre-print
ToGather leverages the state-of-the-art graph theory techniques to generate an actionable and granular intelligence to mitigate the threat imposed by the malicious Internet activity of the Android malware  ...  The state-of-the-art malware mitigation solutions mainly focus on the detection of the actual malicious Android apps using dy- namic and static analyses features to distinguish malicious apps from benign  ...  1). e authors of the PageRank algorithm considers the use case of web sur ng, where the user starts from a web page and randomly moves to another one through a web link.  ... 
arXiv:1806.08893v1 fatcat:lpuh6xwvuzgzzdjqja22khfdty

Challenges and Innovations in Cybersecurity

Simran Baheti
2020 Bioscience Biotechnology Research Communications  
When we think about the activities taking place on the web, we are bound to think about all the crimes that happen throughout the web.  ...  Billions of people use the internet every day and most of them at the same time.  ...  Cloud services like microsoft Azure, Amazon Web services (AWs) and IBm Cloud are adopting Blockchainas-a-service (Baas) which is the third-party cloud-based infrastructure for creating, maintaining and  ... 
doi:10.21786/bbrc/13.14/53 fatcat:f4w6hwrr5fcrzcfudi7qa5ri7q

Cybersecurity of Critical Infrastructures: Challenges and Solutions

Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag
2022 Sensors  
Conflicts of Interest: The authors declare no conflict of interest.  ...  Unfortunately, the lack of a fully functioning semantic web or text-based solutions to formalize security data sources limits the exploitation of existing cyber intelligence data sources.  ...  The widespread use of computers and the Internet, coupled with the threat of activities of cyber criminals, has made it necessary to pay more attention to the detection or improve the technologies behind  ... 
doi:10.3390/s22145105 pmid:35890784 pmcid:PMC9317681 fatcat:ww5uhdj5y5cbxcdvxezwe37cau

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities.  ...  cyber systems, which include device identification, vulnerability discovery, intrusion detection systems (IDSs), honeypots, attribution, and threat intelligence (TI); iv) reviews the relevant content  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures [article]

Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar
2022 arXiv   pre-print
Consequently, cyber adversaries leverage highly sophisticated attack vectors to exploit security vulnerabilities in C3I systems.  ...  Therefore, C3I systems have become a focal point for cyber adversaries.  ...  ACKNOWLEDGMENTS The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government's Cooperative Research Centres Programme.  ... 
arXiv:2104.11906v2 fatcat:nvz3bssy55fwlcwqzkd7n3zism

A Novel Approach to Cyber Hazard Management Intelligence System

B Bala Bharathi, E Suresh Babu
2018 International Journal of Engineering & Technology  
Our proposed solution elongates forward by using Cyber threat intelligence (CTI) which is used to inform decisions timely regarding subject response to the menance or hazard, where the vulnerable systems  ...  to mitigate the cyber threat actions, fortify incident response efforts and enhance your overall security posture.  ...  To overcome this, Threat intelligence mainly performs prevent data loss, Incident response, Threat analysis, Data analysis Overview of Cyber Threat Intelligence (CTI) Threat intelligence often arises  ... 
doi:10.14419/ijet.v7i2.7.10866 fatcat:cmcxmg3i3nfp7puwzzqocespgy

Big Data in Homeland Security

Lidong Wang, Cheryl Ann Alexander
2015 Journal of Information  
It can be used to fight against terrorism and enhance Homeland Security by providing accurate predictions and patterns of terrorist activities.  ...  This paper introduces some methods and technologies used in Homeland Security. They are: biometrics, radio frequency identification (RFID), data mining, cloud computing, and Big Data.  ...  Active cyber defense has synchronized and real-time capabilities to discover, detect, analyze, and mitigate threats and vulnerability.  ... 
doi:10.18488/journal.104/2015.1.2/104.2.59.70 fatcat:uzq3ifmznfhabbgsqlcxxcgqla

Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures

Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
2020 Evolving Systems  
and respond to security threats and risks and and it guides them to handle effectively cyber incidents.  ...  The benefits and added value of using CyberSANE is described with the aid of a set of cyber-attack scenarios.  ...  IoT connectivity, systems interconnectivity) and computation (e.g. cloud services, use of semitrusted mobile devices) paradigms in IT services, and to identify hidden attack vectors, indirect and subliminal  ... 
doi:10.1007/s12530-020-09335-4 fatcat:fx76tetjofdkjapu6ymdrabtdq

Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model

William Steingartner, Darko Galinec, Andrija Kozina
2021 Symmetry  
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods.  ...  Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail.  ...  Introduction The goal of this paper is to construct a novel Hybrid Threats Model and investigate the cyber deception approach for threat detection using deception-based methods.  ... 
doi:10.3390/sym13040597 fatcat:6thxnfbz4zf7jhi4lnenghqiqq

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights [article]

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim
2021 arXiv   pre-print
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats.  ...  ACKNOWLEDGEMENT This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
arXiv:2110.15747v1 fatcat:zboddcg4a5gdxmq5hqmo5cpj34

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Cyber Threat Analysis The cyber security professional is able to identify and assess the capabilities and activities of cyber criminals and/or foreign intelligence agencies using a variety of tools.  ...  He is able to draw conclusions regarding the motivations of adversaries based on analysis.  ... 
doi:10.5281/zenodo.4765645 fatcat:ge7mwxfwpbfk3lifnyoc7aixzq

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Cyber Threat Analysis The cyber security professional is able to identify and assess the capabilities and activities of cyber criminals and/or foreign intelligence agencies using a variety of tools.  ...  He is able to draw conclusions regarding the motivations of adversaries based on analysis.  ... 
doi:10.5281/zenodo.4765646 fatcat:ok3zjkw2ive2tlrpl3btxqr6l4

U.S. Cyber Threat Intelligence Sharing Frameworks

Scott E. Jasper
2016 The international journal of intelligence and counter intelligence  
For instance, the intelligence firm Crowdstrike recently found twelve malicious groups in China using the same exploit codes within 24 to 72 hours of each other. 2 In many cases, malicious attempts to  ...  Underground hacker markets provide them with ready access to a plethora of products and services. 1 Attackers often rent large botnets or use similar attack tool kits.  ...  The use of this intelligence enables an organization to prioritize defenses around prized assets, focusing on vulnerabilities and ways that an adversary activity can be mitigated. 4 Cyber attacks may  ... 
doi:10.1080/08850607.2016.1230701 fatcat:qrhon63hzzhfpaecl53vsalkbu
« Previous Showing results 1 — 15 out of 1,658 results