{"title":"Malware authorship attribution: Unmasking the culprits behind malicious software","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023021","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023021","url":null,"abstract":"With the digital age ushering in an unprecedented proliferation of malware, accurately attributing these malicious software variants to their original authors or affiliated groups has emerged as a crucial endeavor in cybersecurity. This study delves into the intricacies of malware authorship attribution by combining traditional analytical techniques with advanced machine learning methodologies. An integrated approach, encompassing static and dynamic analyses, yielded promising results in the challenging realm of malware attribution. Despite the encouraging outcomes, the research highlighted the multifaceted complexities involved, especially considering the sophisticated obfuscation techniques frequently employed by attackers. This paper emphasizes the merits of a holistic attribution model and underscores the importance of continuous innovation in the face of an ever-evolving threat landscape.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Database security","authors":"Cameron Parisi, Samantha Renicker","doi":"10.54254/2977-3903/2/2023013","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023013","url":null,"abstract":"In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The introductory segment delineates essential fortification strategies and succinctly touches upon optimal practices for shaping a database environments network topography and error mitigation methodologies. Subsequent to this panoramic insight, the discourse pivots to spotlight a diverse array of methodologies to discern and neutralize SQL injection forays.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harnessing the power of federated learning to advance technology","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023020","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023020","url":null,"abstract":"Federated Learning (FL) has emerged as a transformative paradigm in machine learning, advocating for decentralized, privacy-preserving model training. This study provides a comprehensive evaluation of contemporary FL frameworks TensorFlow Federated (TFF), PySyft, and FedJAX across three diverse datasets: CIFAR-10, IMDb reviews, and the UCI Heart Disease dataset. Our results demonstrate TFF's superior performance on image classification tasks, while PySyft excels in both efficiency and privacy for textual data. The study underscores the potential of FL in ensuring data privacy and model performance, yet emphasizes areas warranting improvement. As the volume of edge devices escalates and the need for data privacy intensifies, refining and expanding FL frameworks become essential for future machine learning deployments.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection in cybersecurity","authors":"Johnny Smithie","doi":"10.54254/2977-3903/2/2023014","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023014","url":null,"abstract":"The ever-increasing complexity of cyber threats mandates advanced defense mechanisms. Intrusion Detection Systems (IDS) have emerged as fundamental tools in cybersecurity, incessantly monitoring networks for any suspicious activities. This paper offers an in-depth examination of IDS, tracing its evolution, methodologies, challenges, and future trajectories, substantiating the assertions with empirical studies and research.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social engineering","authors":"Christine Potthas, Patrick Berry, Hamad Al-Naimi","doi":"10.54254/2977-3903/2/2023016","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023016","url":null,"abstract":"The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Router forensics: Navigating the digital crossroads","authors":"Maha Nawaf","doi":"10.54254/2977-3903/2/2023018","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023018","url":null,"abstract":"As the digital landscape continues to evolve, routers have become central gatekeepers, governing the flow of information in networks. This study delves deep into the realm of router forensics, focusing on the methodologies and techniques employed to extract and analyze forensic data from these pivotal devices. Drawing upon both traditional and contemporary approaches, our research underscores the significance of router logs, volatile data, and the challenges that arise in their forensic analysis. We highlight the pressing need for standardized forensic protocols, especially in the face of diverse router architectures and rapidly emerging cyber threats. Our study also emphasizes the potential of leveraging advanced technologies, such as machine learning, in enhancing forensic capabilities. By providing a comprehensive overview of the current state of router forensics and shedding light on potential future trajectories, this research aims to fortify the cybersecurity community's arsenal against escalating cyber threats, ensuring a more secure and resilient digital ecosystem.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SQL injection attacks","authors":"Jene Wrightes","doi":"10.54254/2977-3903/2/2023017","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023017","url":null,"abstract":"SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks. Employing a diverse set of web applications, the study unfolds in a controlled environment, simulating real-world conditions to assess the effectiveness of current defense mechanisms against SQLi. Building upon this baseline, the research introduces a two-pronged defense mechanism: a Static Analysis Tool to pre-emptively identify vulnerabilities in application code and a Runtime Query Sanitizer that employs rule-based patterns and machine learning models to scrutinize and sanitize SQL queries in real-time. Performance evaluation metrics, encompassing detection rate, false positives, response time, and machine learning efficiency, are meticulously documented. Further robustness of these mechanisms is ascertained through real-world simulations involving unsuspecting users and ethical hackers. Initial results indicate promising potential for the introduced methodologies in safeguarding web applications against SQLi attacks. The study's findings serve as a critical step towards fortifying web applications, emphasizing the amalgamation of static analysis and real-time query sanitization as an effective countermeasure against SQLi threats.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing- Benefits, challenges, and promises","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023019","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023019","url":null,"abstract":"The era of cloud computing has ushered in a transformative approach to information technology, redefining the operational modalities for businesses and individuals alike. With an overwhelming shift towards Software-as-a-Service (SaaS) models, the cloud landscape is proving to be both promising and challenging. This study undertook a mixed-methods approach, surveying IT professionals and interviewing organizational leaders, to gauge the current state of cloud adoption. Our findings underscore the dominance of SaaS, with security emerging as a paramount concern. Comparative evaluations of major cloud providers further elucidate the nuances in offerings and pricing strategies. As cloud computing continues its upward trajectory, the onus is on understanding and addressing its multifaceted challenges while leveraging its myriad benefits. This paper concludes by highlighting pivotal areas for future research, encompassing hybrid cloud strategies, the amalgamation of emerging technologies, and cloud's role in Industry 4.0.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linux security","authors":"Gustavo Amarchand, Patrick Brown, Thomas Mahoney","doi":"10.54254/2977-3903/2/2023015","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023015","url":null,"abstract":"Linux is an open source Operating system that is for the most part freely available to the public. Due to its customizability and cost to performance benefits Linux has quickly been adopted by users and companies alike for use in applications such as servers and workstation. As the spread of Linux continues it is important for security specialists to understand the platform and the security issues that affect the platform as well. This paper seeks to first educate the users on what the Linux platforms is and what it offers to the user or company. And it then will expand upon some common or recent vulnerabilities that Linux faces due to the way it functions. After explaining some exploits, the paper will then seek to explain some hardening solutions that are available on the platform.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of issues of impact dynamics based on the SPH method","authors":"Jiawei Guo","doi":"10.54254/2977-3903/1/2023001","DOIUrl":"https://doi.org/10.54254/2977-3903/1/2023001","url":null,"abstract":"Based on the SPH method, this paper investigates a number of key issues in shock dynamics, including the nonlinear phenomenon and its influencing factors in the propagation process of shock waves, and the process and mechanism of the interaction between shock waves and the surface of an object. Through the design of the experiments and the analysis of the results, the main conclusions and contributions of this study are drawn. At the same time, deficiencies and directions for further improvement are also pointed out, and prospects and suggestions for future research on impact dynamics are presented. This study is of great significance in promoting the research of impact dynamics.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136379100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}