{"title":"Improving Resistance of Matrix Factorization Recommenders To Data Poisoning Attacks","authors":"Sulthana Shams, D. Leith","doi":"10.1109/Cyber-RCI55324.2022.10032671","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032671","url":null,"abstract":"In this work, we conduct a systematic study on data poisoning attacks to Matrix Factorisation (MF) based Recommender Systems (RS) where a determined attacker injects fake users with false user-item feedback, with an objective to promote a target item by increasing its rating. We explore the capability of a MF based approach to reduce the impact of attack on targeted item in the system. We develop and evaluate multiple techniques to update the user and item feature matrices when incorporating new ratings. We also study the effectiveness of attack under increasing filler items and choice of target item.Our experimental results based on two real-world datasets show that the observations from the study could be used to design a more robust MF based RS.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116250047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Ireland’s Homecare Companies’ Cookie Practices in terms of GDPR Compliance.","authors":"Gerard Reynolds, Seamus Dowling","doi":"10.1109/Cyber-RCI55324.2022.10032677","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032677","url":null,"abstract":"The General Data Protection Regulation (GDPR) 2016, the Data Protection Act 2018 and the e-Privacy Directive 2002 are applicable legal instruments that impose responsibilities on homecare companies as ‘data controllers’. One of these responsibilities is that they provide their clients with information pertaining to their clients’ rights and the data controllers’ responsibilities as set out by the GDPR. Many homecare companies publish their Privacy Policies on the company website to showcase their compliance and make themselves more attractive to potential clients. Many websites use Cookie (or consent) Management Platforms (CMP’s) to manage their cookies and fulfil their legislative obligations. Cookies gather information and must comply with the terms of data protection and e-Privacy legislation. This research evaluates homecare companies’ Cookie Practices to ascertain GDPR compliance and found them to be lacking the substance and detail necessary to be considered compliant. This was achieved by identifying the websites of homecare companies operating in Ireland, accessing their website using a cookie cleared browser and then examining the researcher’s computer immediately afterwards to see what (if any) cookies had been uploaded, in addition to assessing the homecare companies CMP (where present) for compliance. This research found a high level of non-compliance and suggests that Ireland’s Data Protection Commission (DPC) could and should become more involved in creating solutions by evolving their role to that of a Data Protection Service Provider. By doing so they will improve compliance with data protection legislation and enhance the protections afforded to an individual’s right to privacy.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"8 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129492724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Current State of Cyber Security in Ireland","authors":"Michael Lang, Seamus Dowling, Ruth G. Lennon","doi":"10.1109/Cyber-RCI55324.2022.10032682","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032682","url":null,"abstract":"There is a stark contrast between the state of cyber security of national infrastructure in Ireland and the efforts underway to support cyber security technologists to work in the country. Notable attacks have recently occurred against the national health service, universities, and various other state bodies, prompting an interest in changing the current situation. This paper presents an overview of the security projects, commercial establishments, and policy in Ireland.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131635601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phantom or Menace: User Behaviors in Cybersecurity","authors":"T. Acton, P. Datta, Martin Hughes","doi":"10.1109/Cyber-RCI55324.2022.10032673","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032673","url":null,"abstract":"This paper proposes a specific process-based approach to a systematic literature review to scope extant research on user behavior in cybersecurity. Focusing on the socio- rather than technical aspects of cybersecurity, and employing a 2016 lens robustly operationalised in a leading information systems journal in 2021, it aims to identify pertinent studies, identify a set of categories of behavioral concern, and propose a set of further studies to investigate these categories. Further, the study will identify user-focused behavioral themes of particular concern to organizations and users. At the conference, the paper seeks active discussion on a) the proposed literature bases, b) search terms and approach, and c) proposed research structure, to help refine and effect a robust study resulting in valuable insights on user behaviors that can impact effective cybersecurity.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122117567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VICSORT - A Virtualised ICS Open-source Research Testbed","authors":"Conrad Ekisa, D. O. Briain, Y. Kavanagh","doi":"10.1109/Cyber-RCI55324.2022.10032670","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032670","url":null,"abstract":"Industrial Control Systems (ICS) are at the forefront of most, if not all the critical infrastructure and critical service delivery. ICS underpin modern manufacturing and utility processes and greatly contribute to our day-to-day livelihoods. However, there has been a significant increase in the number and complexity of cyberthreats specifically targetted at ICS, facilitated by increased connectivity in an effort to improve production efficiency. Furthermore, the barriers of entry to ICS cybersecurity are still high given the limited skills base, expensive and proprietary hardware and software as well as the inherent dangers of manipulating real physical processes. This greatly inhibits the practical application of cybersecurity tools in ICS environments and therefore the opportunity for practitioners to gain valuable ICS cybersecurity experience. ICS Testbeds are often either expensive and are not necessarily holistic enough to provide learners with the complete breadth of ICS. This paper introduces VICSORT, a open-source virtualised ICS testbed that provides a platform for ICS cybersecurity learners and practitioners to interface with an ICS environment that closely emulates a real-world ICS, as well as explore and practice techniques for attack and consequently defence of an ICS. VICSORT builds upon the Graphical Realism Framework for Industrial Control Systems (GRFICS) to offer an easier to deploy environment with greater flexibility, whilst requiring significantly less resources all reducing the cost to the learner.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gradient Information from Google GBoard NWP LSTM is Sufficient to Reconstruct Words Typed","authors":"Mohamed Suliman, D. Leith","doi":"10.1109/Cyber-RCI55324.2022.10032666","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032666","url":null,"abstract":"Federated Learning is now widely deployed by Google on Android handsets for distributed training of neural networks. While Federated Learning aims to avoid sharing sensitive user data with Google, in this paper we show that when used for GBoard next word prediction Federated Learning provides little privacy to users. Namely, we demonstrate that the words typed by a user can be quickly and accurately reconstructed from the gradients of the GBoard LSTM used for next word prediction. Use of mini-batches does not protect against reconstruction.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114237760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Areej Alyami, David Sammon, K. Neville, Carolanne Mahony
{"title":"The Critical Success Factors for Security Education, Training and Awareness (SETA) Programmes","authors":"Areej Alyami, David Sammon, K. Neville, Carolanne Mahony","doi":"10.1109/Cyber-RCI55324.2022.10032674","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032674","url":null,"abstract":"This study explores the Critical Success Factors (CSFs) for Security Education, Training and Awareness (SETA) programmes. Data is gathered from 20 key informants (using semi-structured interviews) from various geographic locations including the Gulf nations, Middle East, USA, UK, and Ireland. The analysis of these key informant interviews produces eleven CSFs for SETA programmes. These CSFs are mapped along the phases of a SETA programme lifecycle (design, development, implementation, and evaluation).","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Insecure Software on a Fragmenting Internet","authors":"Ita Ryan, U. Roedig, Klaas-Jan Stol","doi":"10.1109/Cyber-RCI55324.2022.10032675","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032675","url":null,"abstract":"Global geopolitical forces are pushing much of the world towards Internet nationalism, threatening to turn the Internet into a ‘Splinternet.’ In this paper we argue that the crisis in software security will exacerbate this trend. We examine existing moves towards Internet fragmentation on multiple levels. We discuss current trends in online crime, espionage, and warfare. We look at the role of software vulnerabilities, discussing how the prevalence of software security issues could propel nations further apart. We argue that there is an urgent need for a ‘zero tolerance’ attitude to software security issues, and discuss what is needed to create this.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127058881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Penny Wise, Pound Foolish: An Experimental Design of Technology Trust Amongst Organizational Users","authors":"P. Datta, T. Acton, N. Carroll","doi":"10.1109/Cyber-RCI55324.2022.10032669","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032669","url":null,"abstract":"In the face of burgeoning cybersecurity and ransomware attacks, is cybersecurity technology the panacea.7 Building on behavioral economics, particularly moral hazard and Peltzman effects, this research uses a pilot field-experiment to investigate whether cybersecurity technology trust, in departure from general intuition, can make users $zeta$ “penny-wise, pound-foolish,” where technology trust and our growing information needs may erode user-caution, leaving us more vulnerable.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}