A. Pedrouzo-Ulloa, J. Ramon, Fernando Péerez-González, Siyanna Lilova, Patrick Duflot, Zakaria Chihani, N. Gentili, P. Ulivi, Mohammad Ashadul Hoque, Twaha Mukammel, Zeev Pritzker, Augustin Lemesle, J. Loureiro-Acuña, Xavier Martínez, G. Jiménez-Balsa
{"title":"Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies","authors":"A. Pedrouzo-Ulloa, J. Ramon, Fernando Péerez-González, Siyanna Lilova, Patrick Duflot, Zakaria Chihani, N. Gentili, P. Ulivi, Mohammad Ashadul Hoque, Twaha Mukammel, Zeev Pritzker, Augustin Lemesle, J. Loureiro-Acuña, Xavier Martínez, G. Jiménez-Balsa","doi":"10.1109/CSR57506.2023.10224961","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224961","url":null,"abstract":"This paper is an overview of the EU-funded project TRUMPET (https://trumpetproject.eu/), and gives an outline of its scope and main technical aspects and objectives. In recent years, Federated Learning has emerged as a revolutionary privacy-enhancing technology. However, further research has cast a shadow of doubt on its strength for privacy protection. The goal of TRUMPET is to research and develop novel privacy enhancement methods for Federated Learning, and to deliver a highly scalable Federated AI service platform for researchers, that will enable AI-powered studies of siloed, multi-site, cross-domain, cross-border European datasets with privacy guarantees that follow the requirements of GDPR. The generic TRUMPET platform will be piloted, demonstrated and validated in the specific use case of European cancer hospitals, allowing researchers and policymakers to extract AI-driven insights from previously inaccessible cross-border, cross-organization cancer data, while ensuring the patients' privacy.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121747149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lorenzo Principi, M. Baldi, A. Cucchiarelli, L. Spalazzi
{"title":"Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network Traffic","authors":"Lorenzo Principi, M. Baldi, A. Cucchiarelli, L. Spalazzi","doi":"10.1109/CSR57506.2023.10224973","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224973","url":null,"abstract":"Domain names queried by infected network terminals to domain name system (DNS) servers may reveal connection attempts to some command and control (C&C) server, which makes DNS-based malware detection a well-established technique in network security. Such a technique clearly is the only one available when the analysis is performed on DNS server logs. Today, however, intrusion detection approaches that analyze the entire network traffic generated by an endpoint are becoming increasingly popular. In this paper, we assess the effectiveness of DNS-based malware detection even when working over the entire network traffic. We consider malware detection techniques exploiting neural network-based DNS packet analysis and study their effectiveness in detecting malware from real network traffic generated by an infected terminal, also identifying under which conditions they achieve their best detection performance.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133999182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luís Oliveira, A. Chmielewski, Paulina Rutecka, K. Cicha, Mariia Rizun, Nuno Torres, Pedro Pinto
{"title":"Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and Poland","authors":"Luís Oliveira, A. Chmielewski, Paulina Rutecka, K. Cicha, Mariia Rizun, Nuno Torres, Pedro Pinto","doi":"10.1109/CSR57506.2023.10224910","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224910","url":null,"abstract":"Cybersecurity skills are of utmost importance to prevent or mitigate the impact of cyberattacks. In higher education, there are graduations related to Information Technology (IT), where students are expected to develop technical skills, including cybersecurity. Thus, it is relevant to assess students' cybersecurity awareness regarding cybersecurity hygiene and cyber threats when they start their academic studies and to verify whether there are context-dependent differences. This paper presents the results of an assessment regarding the cybersecurity awareness level of 110 first-year students from computer science graduations from two different countries, Poland and Portugal. The assessment was designed as a survey divided into the following two main groups of questions: (1) awareness regarding cybersecurity hygiene and (2) awareness regarding major cyber threats considered in the European Union Agency for Cybersecurity (ENISA) 2021 cyber threat report. The survey results show that Polish and Portuguese students present different self-perceptions and knowledge regarding cybersecurity hygiene and knowledge of cybersecurity. In these areas, Polish students are generally more confident than Portuguese students. Also, Polish students presented better scores around 70%, against the ones obtained by the Portuguese students, scoring around 58%.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nahid Ferdous Aurna, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi
{"title":"Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms","authors":"Nahid Ferdous Aurna, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi","doi":"10.1109/CSR57506.2023.10224978","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224978","url":null,"abstract":"The exponential technological advancement is turning everyone towards an easy and efficient way of financial transactions. Consequently, the use of credit cards is rising substantively, creating a more incredible opportunity for fraudsters which is an alarming concern nowadays since a fraudster may use several tools, techniques and tactics to make a fraudulent transaction. As a countermeasure, an effective fraud detection mechanism and highly sensitive data privacy preservation are imperative to detect fraudulent transactions. This paper proposes a Federated Learning (FL)-based fraud detection system since its key feature preserves the privacy of highly sensitive data, wherein the model could be trained without sharing the credit card data in the cloud. We contemplate three Deep Learning (DL) models: Convolutional Neural Network (CNN), Multi-Layer Perceptron (MLP), and Long Short-Term Memory (LSTM) regarding the FL approach. Subsequently, to overcome the data imbalance issue, four distinct sampling techniques are explored to inspect the impact on the traditional centralized and FL approaches. Finally, we further investigate and compare FL-based detection systems with diversified state-of-the-art models. Our experimental results demonstrate that the proposed method is superior compared with state-of-the-art methods and achieves high detection rate of 99.51%, 98.77% and 98.20% respectively for CNN, MLP and LSTM models.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Ben Farah, M. Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Mohamed. Benfarah, Omar. Alkadri, Yussuf Ahmed, X. Bellekens
{"title":"Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies","authors":"Mohamed Ben Farah, M. Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Mohamed. Benfarah, Omar. Alkadri, Yussuf Ahmed, X. Bellekens","doi":"10.1109/CSR57506.2023.10224972","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224972","url":null,"abstract":"The maritime industry is facing an escalating concern of cybersecurity threats, which can be attributed to the rapid growth of digital technologies and the recent adoption of autonomous and semi-autonomous shipping. To address this issue, various published papers have proposed cyberattack scenarios aiming to increase cybersecurity awareness and enhance the security of maritime systems. This research aims to assess the cybersecurity threats in the maritime sector by presenting three practical cyberattack scenarios and their corresponding risks and mitigation strategies. The first scenario involves the risks associated with utilizing the systems of a tug-boat as part of an attack vector, the second scenario examines the systems involved in vessel harbour manoeuvres using a laser docking system or Radar, and the third scenario examines an insider attack through malicious or unauthorized access to the Berthing Aid System (BAS).","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"36 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131754685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
George Hatzivasilis, S. Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, G. Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, C. Basile, J. F. Ruiz
{"title":"Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain","authors":"George Hatzivasilis, S. Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, G. Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, C. Basile, J. F. Ruiz","doi":"10.1109/CSR57506.2023.10224971","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224971","url":null,"abstract":"Cyber security always forms a significant aspect of ICT infrastructure, with threats on supply-chain networks gaining greater attention nowadays. The secure autonomous driving domain presents a unique set of challenges for supply-chain security. Autonomous vehicles rely on a complex ecosystem of hardware and software components, many of which are sourced from third-party suppliers. Ensuring the security and reliability of this supply-chain is essential to maintain the safety and viability of autonomous driving as a technology. To address these challenges, a continuous security assurance approach is necessary. This involves ongoing monitoring, assessment, and improvement of security measures to detect and mitigate potential vulnerabilities in the supply chain. Key measures may include regular vulnerability assessments, penetration testing, and security awareness training for employees and contractors, as well as the implementation of security controls such as secure communication protocols, access controls, and intrusion detection systems. By adopting a continuous security assurance approach for supply chain security in the secure autonomous driving domain, organizations can safeguard their operations and ensure the safety of passengers and other road users. This paper presents a security assurance and certification solution for supply-chain services. Security elements are continuously assessed based on AI operations. The proposal is implemented under the EU funded project FISHY and applied in the supply-chain of secure autonomous driving (SADE) pilot with REMOTIS smart vehicles. Nevertheless, it is a generic solution that can be applied in any domain.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control-Implications-Based Side-Channel Monitoring for Embedded Systems","authors":"Sandip Roy, Benjamin Drozdenko","doi":"10.1109/CSR57506.2023.10224942","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224942","url":null,"abstract":"Monitoring of embedded-system anomalies which influence the regulation of physical-world processes is examined. Specifically, detection of such anomalies using remote measurements of the controlled process itself - which we refer to as a controlled-process side channel - is studied. A physics-guided anomaly detection algorithm is proposed, which decomposes the measurement signal into patterned and ambient responses, and exploits sparsity in both components. Detailed simulations of two controlled-process side channels on an autonomous underwater vehicle, namely a motion guidance system and a sonar transmitter, are undertaken to assess the methodology. Our preliminary findings suggest that controlled process side channels may be sufficient for monitoring anomalies, when traditional side channel signals are difficult to measure.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Campanile, Maria Stella de Biase, Roberta De Fazio, Michele Di Giovanni, F. Marulli, Laura Verde
{"title":"Merging Model-Based and Data-Driven Approaches for Resilient Systems Digital Twins Design","authors":"L. Campanile, Maria Stella de Biase, Roberta De Fazio, Michele Di Giovanni, F. Marulli, Laura Verde","doi":"10.1109/CSR57506.2023.10224945","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224945","url":null,"abstract":"Nowadays, the problem of system robustness, es-pecially in critical infrastructures, is a challenging open question. Some systems provide crucial services continuously failing, threatening the availability of the provided services. By designing a robust architecture, this criticality could be overcome or limited, ensuring service continuity. The definition of a resilient system involves not only its architecture but also the methodology implemented for the calculation and analysis of some indices, quantifying system performance. This study provides an innovative architecture for Digital Twins implementation based on a hybrid methodology for improving the control system in realtime. The introduced approach brings together different techniques. In particular, the work combines the point of strengths of Model-based methods and Data-driven ones, aiming to improve system performances.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Souhila Badra Guendouzi, Samir Ouchani, Hiba El Assaad, Madeleine El Zaher
{"title":"FedGA-Meta: Federated Learning Framework using Genetic Algorithms and Meta-Learning for Aggregation in Industrial Cyber- Physical Systems","authors":"Souhila Badra Guendouzi, Samir Ouchani, Hiba El Assaad, Madeleine El Zaher","doi":"10.1109/CSR57506.2023.10224975","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224975","url":null,"abstract":"In Industry 4.0, factories encounter significant challenges in making informed decisions to maintain or enhance their industry standing. By utilizing machine learning (ML), they can improve product quality, decrease production downtime, and boost operational efficiency. However, acquiring datasets with sufficient variation and diversity to train a robust neural network centrally is a challenge within the industrial sector. Consequently, federated learning (FL) offers a decentralized approach that safeguards data privacy, enabling smart infrastructures to train collaborative models locally and independently while retaining local data. In this paper, we present FedGA-Meta framework, which combines FL, meta-learning, and domain adaptation to enhance model performance and generalizability, particularly when training across distributed factories with varying network and data conditions. The results obtained demonstrate the effectiveness and efficiency of our FedGA-Meta framework.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115512288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Pattern Mining Algorithms for Event Logs","authors":"Orkhan Gasimov, Risto Vaarandi, Mauno Pihelgas","doi":"10.1109/CSR57506.2023.10224996","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224996","url":null,"abstract":"During the last two decades, the mining of message patterns from textual event logs has become an important security monitoring and system management task. A number of algorithms have been developed for that purpose, and recently several comparative studies of these algorithms have been published. However, existing studies have several drawbacks like the lack of performance evaluation on real-life data sets and the use of suboptimal settings for evaluated algorithms. This paper addresses these issues and evaluates commonly used log mining algorithms on a number of security and system event logs.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}