{"title":"Classification of malicious and benign websites by network features using supervised machine learning algorithms","authors":"S. Kaddoura","doi":"10.1109/CSNet52717.2021.9614273","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614273","url":null,"abstract":"Due to the increase in Internet usage through the past years, cyber-attacks have rapidly increased, leading to high personal information and financial loss. Cyberattacks can include phishing, spamming, and malware. Because websites, the most common element of the Internet, are widely used, hackers find their targets to attack. Therefore, the detection of malicious websites is critical for organizations and individuals to increase security. The earlier a malicious website is detected, the faster it is defended. In this paper, a dataset is analyzed and applied to multiple supervised machine learning models such as Random Forest, Artificial Neural Network, K-nearest neighbors, and Support Vector Machine. The dataset attributes are extracted based on the application layer and different network characteristics. The experimental studies with many benign and malicious websites obtained from real-life Internet resources show a high prediction performance. Due to the imbalanced dataset studied in this paper, the F1-score was measured instead of the accuracy. The support vector machine algorithm showed the highest performance over all the other algorithms studied, with a value of 92%.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115381768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Evasive Malware Authoring Techniques","authors":"Mathew Nicho, Maitha Alkhateri","doi":"10.1109/CSNet52717.2021.9614645","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614645","url":null,"abstract":"Malware have proliferated due to the ease at which it can be created, sourced, or purchased. Furthermore, with extensive accessibility of obfuscation, binding and crypting tools, infection has become widespread and effortless. While advanced persistent threats (APT) use zero-day malware or near zero day, it has been observed that not all malwares in the wild are zero or near zero day. Hence, in this paper our objective is (1) model malware authoring process, (2) recreate the process of malware authoring by creating 18 malwares using four different commonly used constructor (malware authoring) tools, (3) evaluate the detection rate, and (4) observe if the OS defenses quarantine these payloads. Hence our process involves malware creation, detection, infection, and analysis.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116005104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. B. Velloso, David Cordova Morales, Mai Trang Nguyen, G. Pujolle
{"title":"State of the art: Cross chain communications","authors":"P. B. Velloso, David Cordova Morales, Mai Trang Nguyen, G. Pujolle","doi":"10.1109/CSNet52717.2021.9614274","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614274","url":null,"abstract":"The concept of blockchain 3.0 consists of using distributed ledgers to store any kind of information other than crypto-currency or financial information. The main idea lies in applying the blockchain technology to secure different kinds of applications, as for instance, health care, electronic voting, and IoT. However, in general, these applications require distinct types of blockchains, with diverse characteristics. As a result, each application employs its own blockchain solution that cannot exchange information with other applications. Hence, blockchain interoperability has become an important issue, since it allows not only exchanging data among applications but also to offer the possibility of developing multi-blockchain systems. Using multiple blockchains can improve the scalability of the system, which is a fundamental issue in blockchain technology. Besides, it can also help to organize data into different blockchains, allowing a more efficient access control. Therefore, in this paper we present the main solutions in the literature to enable cross-chain communications, which is the key issue to accomplish blockchain interoperability. We present solutions with different approaches to cope with cross-chain communications. We also investigate the benefits of smart contracts to implement cross-chain communication.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eiman Alothali, Hany Alashwal, Motamen Salih, Kadhim Hayawi
{"title":"Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka","authors":"Eiman Alothali, Hany Alashwal, Motamen Salih, Kadhim Hayawi","doi":"10.1109/CSNet52717.2021.9614282","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614282","url":null,"abstract":"Social media networks, like Facebook and Twitter, are increasingly becoming important part of most people's lives. Twitter provides a useful platform for sharing contents, ideas, opinions, and promoting products and election campaigns. Due to the increased popularity, it became vulnerable to malicious attacks caused by social bots. Social bots are automated accounts created for different purposes. They are involved in spreading rumors and false information, cyberbullying, spamming, and manipulating the ecosystem of social network. Most of the social bots detection methods rely on the utilization of offline data for both training and testing. In this paper, we use Apache Kafka, a big data analytics tool to stream data from Twitter API in real time. We use profile information (metadata) as features. A machine learning technique is applied to predict the type of the incoming data (human or bot). In addition, the paper presents technical details of how to configure these different tools.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121037915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI based Login System using Facial Recognition","authors":"Siem Girmay, Faniel Samsom, A. Khattak","doi":"10.1109/CSNet52717.2021.9614281","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614281","url":null,"abstract":"With rapid growth in the application of AI, Access Control Systems are walking in a new technology lane. Powered by deep learning technologies or cognitive analytics, login pages can implement more secure, efficient, and easy to use authentication systems. Face Detection and Recognition is emerging as preferred solution to enable secure verification and authentication in login systems. Moreover, Facial Recognition has been applied in many fields from unlocking smartphones through built in camera of smartphones to identification of suspected people by the law enforcement organizations. The goal of this research paper is to provide an easier authentication system using Face Detection and Recognition instead of using usernames and passwords. This paper mainly analyzes the application of Face detection systems to authenticate and login users It presents the prototype system implemented with the usage of a Flask server, requesting face recognition services from Amazon's Rekognition. The prototype receives images of the user instead of his username and password. The received image is analyzed by AWS's Face recognition tools and the ID of the face is sent as a response along with the confidence level of the algorithm used to analyze the face. The prototype is tested with eight different faces and the system authenticate users with 100% accuracy and navigate them to their respective feeds.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AbdElaziz Saad AbdElaziz AbdElaal, Kai Lehniger, P. Langendörfer
{"title":"Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices","authors":"AbdElaziz Saad AbdElaziz AbdElaal, Kai Lehniger, P. Langendörfer","doi":"10.1109/CSNet52717.2021.9614275","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614275","url":null,"abstract":"Code-reuse attacks pose a threat to embedded devices since they are able to defeat common security defenses such as non-executable stacks. To succeed in his code-reuse attack, the attacker has to gain knowledge of some or all of the instructions of the target firmware/software. In case of a bare-metal firmware that is protected from being dumped out of a device, it is hard to know the running instructions of the target firmware. This consequently makes code-reuse attacks more difficult to achieve. This paper shows how an attacker can gain knowledge of some of these instructions by sniffing the unencrypted incremental updates. These updates exist to reduce the radio reception power for resource-constrained devices. Based on the literature, these updates are checked against authentication and integrity, but they are sometimes sent unencrypted. Therefore, it will be demonstrated how a Return-Oriented Programming (ROP) attack can be accomplished using only the passively sniffed incremental updates. The generated updates of the R3diff and Delta Generator (DG) differencing algorithms will be under assessment. The evaluation reveals that both of them can be exploited by the attacker. It also shows that the DG generated updates leak more information than the R3diff generated updates. To defend against this attack, different countermeasures that consider different power consumption scenarios are proposed, but yet to be evaluated.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"46 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113939001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets","authors":"P. Urien","doi":"10.1109/csnet52717.2021.9614649","DOIUrl":"https://doi.org/10.1109/csnet52717.2021.9614649","url":null,"abstract":"Blockchain transactions are signed by private keys. Secure key storage and tamper resistant computing, are critical requirements for deployments of trusted infrastructure. In this paper we identify some threats against blockchain wallets, and we introduce a set of physical and logical countermeasures in order to defeat them. We introduce open software and hardware architectures based on secure elements, which enable detection of cloned device and corrupted software. These technologies are based on resistant computing (javacard), smartcard anti cloning, smartcard self content attestation, applicative firewall, bare metal architecture, remote attestation, dynamic PUF (Physical Unclonable Function), and programming token as root of trust.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132997083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zainab Khalid, Farkhund Iqbal, F. Kamoun, Mohammed Hussain, Liaqat Ali Khan
{"title":"Forensic Analysis of the Cisco WebEx Application","authors":"Zainab Khalid, Farkhund Iqbal, F. Kamoun, Mohammed Hussain, Liaqat Ali Khan","doi":"10.1109/CSNet52717.2021.9614647","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614647","url":null,"abstract":"The COVID-19 pandemic has triggered a surge in the usage of videoconferencing applications around the globe. While this trend provided a convenient alternative to face-to-face meetings, it has also opened the door for new scenarios of malicious attacks. The security and privacy of the (vidéoconférence) participants' data has therefore become a major concern. Despite its importance, the forensic analysis of videoconferencing applications remains a relatively under researched area. This paper presents a detailed analysis of the Cisco WebEx videoconferencing application on a Windows OS in the areas of memory forensics, disk-space forensics and network forensics. From the extracted artifacts, it is evident that valuable user data can be retrieved from different sources. These include user emails, user IDs, profile photos, sent and deleted chat messages, shared media, meeting information including meeting passwords, Advanced Encryption Standard (AES) keys, keyword searches, timestamps, and log files. Although network communications are encrypted, some useful artifacts can be retrieved such as IPs of server domains and host devices along with message/event timestamps. Digital certificates of the videoconferencing communications are also retrieved.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raphaël M. J. I. Larsen, Marc-Oliver Pahl, G. Coatrieux
{"title":"Authenticating IDS autoencoders using multipath neural networks","authors":"Raphaël M. J. I. Larsen, Marc-Oliver Pahl, G. Coatrieux","doi":"10.1109/CSNet52717.2021.9614279","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614279","url":null,"abstract":"An Intrusion Detection System (IDS) is a core element for securing critical systems. An IDS can use signatures of known attacks, or an anomaly detection model for detecting unknown attacks. Attacking an IDS is often the entry point of an attack against a critical system. Consequently, the security of IDSs themselves is imperative. To secure model-based IDSs, we propose a method to authenticate the anomaly detection model. The anomaly detection model is an autoencoder for which we only have access to input-output pairs. Inputs consist of time windows of values from sensors and actuators of an Industrial Control System. Our method is based on a multipath Neural Network (NN) classifier, a newly proposed deep learning technique. The idea is to characterize errors of an IDS's autoencoder by using a multipath NN's confidence measure ${c}$. We use the Wilcoxon-Mann-Whitney (WMW) test to detect a change in the distribution of the summary variable ${c}$, indicating that the autoencoder is not working properly. We compare our method to two baselines. They consist in using other summary variables for the WMW test. We assess the performance of these three methods using simulated data. Among others, our analysis shows that: 1) both baselines are oblivious to some autoencoder spoofing attacks while 2) the WMW test on a multipath NN's confidence measure enables detecting eventually any autoencoder spoofing attack.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Cordova Morales, P. B. Velloso, Alexandre Laubé, T. Nguyen, G. Pujolle
{"title":"C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network","authors":"David Cordova Morales, P. B. Velloso, Alexandre Laubé, T. Nguyen, G. Pujolle","doi":"10.1109/CSNet52717.2021.9614651","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614651","url":null,"abstract":"Blockchain designed for Mobile Ad hoc Networks (MANET) and mesh networks is an emerging research topic which has to cope with the network partition problem. However, existing consensus algorithms used in blockchains have been designed to work in a fully connected network with reliable communication. As this assumption does not hold anymore in mobile wireless networks, we describe in this paper the problem of network partitions and its impact on blockchain. Then, we propose a new consensus algorithm called Consensus for Mesh (C4M) which inspires from RAFT as a solution to this problem. The C4M consensus algorithm is integrated in Blockgraph, a blockchain solution for MANET and mesh networks. We implemented our solution in NS-3 to analyze its performances through simulations. The simulation results show that the heartbeat interval and the election timeout have a great impact on the leader election time, especially in case of topology changes.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128514642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}