{"title":"Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis","authors":"S. Aslam, A. Altaweel, I. Kamel","doi":"10.1145/3590777.3590781","DOIUrl":"https://doi.org/10.1145/3590777.3590781","url":null,"abstract":"Wormhole attack has exposed-mode (internal attack with exposed attacker nodes identities) and hidden-mode (external attack with hidden attacker nodes identities). In exposed-mode, the pair-wise connected attacker nodes fool the legitimate nodes by using a hidden link to route packets and yield high packet delivery ratio. As the packets reach the wormhole nodes, attackers can initiate traffic analysis, packet dropping, and/or packet modification attacks. This paper studies and analyzes the impact of the exposed-mode of wormhole attack in Opportunistic Mobile Networks (OMNs) and the parameters affecting it. The impacts of the exposed-mode of wormhole attack are analyzed using the amount of extra routed packets the attacker nodes will obtain. The attack was launched by varying different parameters (i.e., number of wormhole nodes, attack frequency, and attack duration) that influence its intensity against four main routing protocols in OMNs (i.e., Prophet, Spray and Wait, Epidemic, and First Contact). The simulation experiments employed two widely-used mobility traces (real-world and synthetic) in OMNs and were analyzed in terms of the most vulnerable routing protocol and the most influential attack parameter. We concluded that attackers can smartly overthrow safe communications in OMNs using deep analysis of routing mechanisms and nodes density.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments","authors":"Mordechai Guri","doi":"10.1145/3590777.3590793","DOIUrl":"https://doi.org/10.1145/3590777.3590793","url":null,"abstract":"Many modern malware employs runtime anti-forensic techniques in order to evade detection. Anti-forensic tactics can be categorized as anti-virtualization (anti-VM), anti-debugging, anti-sandbox, and anti forensic-tools. The detection of such malware is challenging since they do not reveal their malicious behavior and are therefore considered benign. We present CLOUDOSCOPE, a novel architecture for detecting anti-forensic malware using the power of public cloud environments. The method we use involves running samples on bare metal machines, then running and monitoring them in multiple forensic environments deployed in the cloud. That includes virtual machines, debugging, sandboxes, and forensic environments. We identify anti-forensic behavior by comparing results in forensic and non-forensic environments. Anti-forensic malware would expose a difference between bare-metal, non-forensic, and virtualized forensic executions. Furthermore, our method enables the identification of the specific anti-forensic technique(s) used by the malware. We provide background on anti-forensic malware, present the architecture, design and implementation of CLOUDOSCOPE, and the evaluation of our system. Public cloud environments can be used to identify and detect stealthy, anti-forensic malware, as shown in our evaluation.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks","authors":"Anže Mihelič, Igor Bernik, Simon L. R. Vrhovec","doi":"10.1145/3590777.3590814","DOIUrl":"https://doi.org/10.1145/3590777.3590814","url":null,"abstract":"This work reports on a preliminary analysis of an ongoing study on adoption of tablet computers (tablets) among older adults. Results indicate that only perceived usefulness and knowledge (a dimension of facilitating conditions) are directly associated with older adults’ intention to use tablets. While perceived threat of cyber attacks may not be directly associated, it plays a significant role in predicting older adults’ fear of tablet use and their rejection of tablets’ benefits.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital safety alarms – Exploring the understandings of the cybersecurity practice in Norwegian municipalities","authors":"Alvhild Skjelvik, Arnstein Vestad","doi":"10.1145/3590777.3590798","DOIUrl":"https://doi.org/10.1145/3590777.3590798","url":null,"abstract":"In this paper we describe initial results from a qualitative study on municipal approaches to cybersecurity in welfare technology or medical IoT. The paper is based on interviews with stakeholders from municipal IT and health services where digital safety alarms are used as a case to study how stakeholders with differing perspectives communicate and cooperate to secure these solutions. We identify three key issues related to the factors that motivate the municipalities to perform cybersecurity work and how different perspectives between IT and healthcare affect this, and discuss these findings utilizing protection motivation theory. We further discuss the need for shared understanding of cybersecurity and risk between health and IT as well as how municipalities are approaching to bridge this gap","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acceptance Factors and Obstacles for Cryptocurrency Adoption","authors":"Peter Hamm, Sebastian Pape, David Harborth","doi":"10.1145/3590777.3590782","DOIUrl":"https://doi.org/10.1145/3590777.3590782","url":null,"abstract":"In spite of all the hype, media attention, and explosion in market valuations, cryptocurrencies have so far failed to find wide acceptance as a means of payment. This has led to a wealth of literature investigating why cryptocurrencies such as Bitcoin failed to establish themselves widely. However, these investigations have generally focused on specific cryptocurrencies and did not highlight which features of cryptocurrencies help or hinder adoption. This paper helps close this gap by conducting a qualitative user study with 960 respondents representative of the German population, obtaining freeform answers on the main adoption factors as well as the main obstacles for cryptocurrencies from both existing and potential users. We identify 33 reasons for and against cryptocurrency adoption, distributed into financial, ideological, benefits-based, technical, acceptance-based, and security-based categories. The contribution of this paper is threefold: We go beyond positive reasons and explicitly consider obstacles to cryptocurrency adoption inside a unified framework. We also identify additional payment system features that differ between different cryptocurrencies and influence their adoption. Thirdly, we identify adoption factors based on perceptions and personalities rather than just measurable features. Therefore, this paper also adds to the ongoing systematization of cryptocurrencies in the current stream of literature on the topic.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Petra Grd, Ena Barčić, Igor Tomičić, Bogdan Okreša Đurić
{"title":"Analysing the Impact of Gender Classification on Age Estimation","authors":"Petra Grd, Ena Barčić, Igor Tomičić, Bogdan Okreša Đurić","doi":"10.1145/3590777.3590813","DOIUrl":"https://doi.org/10.1145/3590777.3590813","url":null,"abstract":"Age estimation from facial images is one of the most popular fields of research concerning deep learning and convolutional neural networks. However, there are several factors influencing the final accuracy that require special consideration, and in this research, we examine how gender classification affects age estimation. We use a predefined version of the MobileNetV2 convolutional neural network and train it on the CASIAWebFace dataset which we augmented with our private dataset called AgeCFBP. For the purpose of testing the network performance, we used the FG-NET dataset. The results of our experiments showed that gender pre-classification has a measurable impact on age estimation in both male and female population by decreasing Mean Absolute Error (MAE) metric, which might lead to enhanced applications in real-world scenarios, such as biometric authentication, security systems, human-computer interaction, and age-restricted content access control.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129469910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yichao Wang, Budi Arief, V. N. Franqueira, Anna Grace Coates, Caoilte Ó Ciardha
{"title":"Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned","authors":"Yichao Wang, Budi Arief, V. N. Franqueira, Anna Grace Coates, Caoilte Ó Ciardha","doi":"10.1145/3590777.3590812","DOIUrl":"https://doi.org/10.1145/3590777.3590812","url":null,"abstract":"Child sexual exploitation and abuse (CSEA) and the associated distribution of child sexual abuse material (CSAM) are serious offences online and offline. They are exacerbated by the increased popularity of dark web markets, in which vendors and buyers can exchange CSAM while hiding their identities. The aim of this paper is to improve our understanding of the CSEA landscape in dark web markets. We reviewed and collated four groups of keywords (a total of 198) for the detection/discovery of potential CSAM on the dark web market. This allowed us to conduct a systematic data collection (i.e., scraping) on dark web markets containing CSAM to create a new text-based dataset and perform further analysis. We found that CSAM is more public in the Chinese market, but not in the mainstream English market. To illustrate this point, we detected 724 CSAM items in the two Chinese dark web markets studied, but none in the eight English markets. While the prices of these CSAM remain low, we found that there were 3,449 sales over the 44-week observation period, implying that CSAM has been commercialised to some extent. We also noticed that mainstream cloud-based data storage services were used for the distribution and sharing of CSAM. We hope that the findings presented in this paper can help relevant stakeholders to understand the CSAM landscape in the dark web market better, which in turn may be used to devise more effective countermeasures to combat CSEA and CSAM.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131357398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Venkata Satya Sai Ajay Daliparthi, Nurul Momen, K. Tutschku, Miguel de Prado
{"title":"ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection","authors":"Venkata Satya Sai Ajay Daliparthi, Nurul Momen, K. Tutschku, Miguel de Prado","doi":"10.1145/3590777.3590794","DOIUrl":"https://doi.org/10.1145/3590777.3590794","url":null,"abstract":"The size and diversity of the training datasets directly influences the decision-making process of AI models. Therefore, there is an immense need for massive and diverse datasets to enhance the deployment process of AI applications. Crowdsourcing marketplaces provide a fast and reliable alternative to the laborious data collection process. However, the existing crowdsourcing marketplaces are either centralized or do not fully provide data sovereignty. By contrast, this work proposes a decentralized crowdsourcing platform through prototypical implementation along with active involvement of business entities, that grants the users sovereignty over their collected data, named as Vision-Sovereignty Data Marketplace (ViSDM). This work contributes to the data marketplaces landscape by introducing (i) A liquid democracy-based voting system to negotiate prices between a buyer and multiple data owners, (ii) An automated AI-Based per-sample value calculation function to evaluate the data and distribute profit among the data owners.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133654712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georgios Agrafiotis, Eftychia Makri, Antonios Lalas, K. Votis, D. Tzovaras, Nikolaos Tsampieris
{"title":"A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques","authors":"Georgios Agrafiotis, Eftychia Makri, Antonios Lalas, K. Votis, D. Tzovaras, Nikolaos Tsampieris","doi":"10.1145/3590777.3590807","DOIUrl":"https://doi.org/10.1145/3590777.3590807","url":null,"abstract":"As 5G networks become more complex, cyber attacks targeting IoT devices are deemed a serious concern. This work proposes a novel approach to detect 5G malware traffic using a network packet preprocess toolkit and machine learning models. The system can transform packets into images or embeddings, which allows for more accurate representations that can be applied in a commercial Intrusion Detection System application in a protocol agnostic manner. The paper introduces Long Short-Term Memory Autoencoders as the preprocessing method for embeddings generation followed by a Fully-Connected network for classification purposes of a 5G-dedicated dataset. The proposed approach is efficient and adaptable to evolving threats and protocols, achieving enhanced accuracy rates in detecting 5G malware traffic. This new method can facilitate defending against 5G malware attacks and paves the way for future developments in 6G networks.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114738700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis","authors":"Martin Atzmueller, Sophia Sylvester, R. Kanawati","doi":"10.1145/3590777.3590803","DOIUrl":"https://doi.org/10.1145/3590777.3590803","url":null,"abstract":"In this paper, we target the problem of mining descriptive profiles of computer network intrusion attacks. We present an exploratory and explanation-aware approach using subgroup discovery – facilitating human-in-the-loop interaction for guiding the exploration process – since the results of subgroup discovery are inherently interpretable patterns. Furthermore, we explore enriching the feature set describing the network traffic (i. e., exchanged packets) with a new type of features computed on complex networks depicting the interactions among the different involved sites. Complex networks based metrics provide explainable features on the global network level, compared to local features targeted at the local network traffic/packet level. We exemplify the proposed approach using the standard UNSW-NB15 dataset for network intrusion detection.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134132855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}