Skip to main content

Showing 1–13 of 13 results for author: Ghita, B

.
  1. arXiv:2402.13746  [pdf, ps, other

    cs.CR

    A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence

    Authors: Ali Alshumrani, Nathan Clarke, Bogdan Ghita

    Abstract: The modern digital world is highly heterogeneous, encompassing a wide variety of communications, devices, and services. This interconnectedness generates, synchronises, stores, and presents digital information in multidimensional, complex formats, often fragmented across multiple sources. When linked to misuse, this digital information becomes vital digital evidence. Integrating and harmonising th… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 16 pages, 4 figures. To appear in the conference proceedings of the Third International Conference on Ubiquitous Security (UbiSec 2023), Exeter, UK, November, 2023

  2. arXiv:2311.17578  [pdf

    cs.CR

    Data Driven Approaches to Cybersecurity Governance for Board Decision-Making -- A Systematic Review

    Authors: Anita Modi, Ievgeniia Kuzminykh, Bogdan Ghita

    Abstract: Cybersecurity governance influences the quality of strategic decision-making to ensure cyber risks are managed effectively. Board of Directors are the decisions-makers held accountable for managing this risk; however, they lack adequate and efficient information necessary for making such decisions. In addition to the myriad of challenges they face, they are often insufficiently versed in the techn… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  3. arXiv:2109.09906  [pdf

    cs.SD cs.AI eess.AS

    Audio Interval Retrieval using Convolutional Neural Networks

    Authors: Ievgeniia Kuzminykh, Dan Shevchuk, Stavros Shiaeles, Bogdan Ghita

    Abstract: Modern streaming services are increasingly labeling videos based on their visual or audio content. This typically augments the use of technologies such as AI and ML by allowing to use natural speech for searching by keywords and video descriptions. Prior research has successfully provided a number of solutions for speech to text, in the case of a human speech, but this article aims to investigate… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020 and 13th Conference on the Internet of Things and Smart Spaces, ruSMART 2020

  4. Comparative Analysis of Cryptographic Key Management Systems

    Authors: Levgeniia Kuzminykh, Bogdan Ghita, Stavros Shiaeles

    Abstract: Managing cryptographic keys can be a complex task for an enterprise and particularly difficult to scale when an increasing number of users and applications need to be managed. In order to address scalability issues, typical IT infrastructures employ key management systems that are able to handle a large number of encryption keys and associate them with the authorized requests. Given their necessit… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020 and 13th Conference on the Internet of Things and Smart Spaces, ruSMART 2020

  5. A Novel Online Incremental Learning Intrusion Prevention System

    Authors: Christos Constantinides, Stavros Shiaeles, Bogdan Ghita, Nicholas Kolokotronis

    Abstract: Attack vectors are continuously evolving in order to evade Intrusion Detection systems. Internet of Things (IoT) environments, while beneficial for the IT ecosystem, suffer from inherent hardware limitations, which restrict their ability to implement comprehensive security measures and increase their exposure to vulnerability attacks. This paper proposes a novel Network Intrusion Prevention System… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 6 pages

  6. Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation

    Authors: Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis

    Abstract: Internet of Things devices have seen a rapid growth and popularity in recent years with many more ordinary devices gaining network capability and becoming part of the ever growing IoT network. With this exponential growth and the limitation of resources, it is becoming increasingly harder to protect against security threats such as malware due to its evolving faster than the defence mechanisms can… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 8 pages, 7 figures, 4 tables

    Journal ref: NEW2AN 2019, ruSMART 2019: Internet of Things, Smart Spaces, and Next Generation Networks and Systems pp 65-76

  7. A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain

    Authors: Richard Brown, Gueltoum Bendiab, Stavros Shiaeles, Bogdan Ghita

    Abstract: Traditional authentication systems that rely on simple passwords, PIN numbers or tokens have many security issues, like easily guessed passwords, PIN numbers written on the back of cards, etc. Thus, biometric authentication methods that rely on physical and behavioural characteristics have been proposed as an alternative for those systems. In real-world applications, authentication systems that in… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Report number: 13 pages, 8 figures, 3 tables

    Journal ref: INC 2020: 12th International Network Conference 2020, Rhodes, Greece, 19-21 September 2020

  8. Detection of Insider Threats using Artificial Intelligence and Visualisation

    Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab

    Abstract: Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact. For the implementation of the experimental stage described in this study, the Convolutio… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Comments: 8 pages, 5 figures, 1 table

    Journal ref: 2020 6th IEEE International Conference on Network Softwarization (NetSoft)

  9. The Challenges with Internet of Things for Business

    Authors: Ievgeniia Kuzminykh, Bogdan Ghita, Jose M. Such

    Abstract: Many companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact of IoT security measures on the security challenges. This paper presents a review of the current state of security of IoT in companies that produce IoT products and have begun… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    Comments: 9 pages, 42 references

  10. arXiv:2012.03577  [pdf

    cs.CR

    Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions

    Authors: Ievgeniia Kuzminykh, Bogdan Ghita, Alexandr Silonosov

    Abstract: Authentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, can be used in remote display access to guarantee the security of use of remote connectivity systems during the access control phase or throughout the session. This paper inves… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    Comments: Copy draft with 10 pages, 4 figures,35 references

  11. A machine-learning approach to Detect users' suspicious behaviour through the Facebook wall

    Authors: Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab

    Abstract: Facebook represents the current de-facto choice for social media, changing the nature of social relationships. The increasing amount of personal information that runs through this platform publicly exposes user behaviour and social trends, allowing aggregation of data through conventional intelligence collection techniques such as OSINT (Open Source Intelligence). In this paper, we propose a new m… ▽ More

    Submitted 31 October, 2019; originally announced October 2019.

    Comments: 8 pages

    Journal ref: 19th International Conference, NEW2AN 2019, and 12th Conference, ruSMART 2019

  12. Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis

    Authors: Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan Ghita

    Abstract: Malicious software is detected and classified by either static analysis or dynamic analysis. In static analysis, malware samples are reverse engineered and analyzed so that signatures of malware can be constructed. These techniques can be easily thwarted through polymorphic, metamorphic malware, obfuscation and packing techniques, whereas in dynamic analysis malware samples are executed in a contr… ▽ More

    Submitted 12 March, 2019; originally announced April 2019.

    Comments: 2018 Global Information Infrastructure and Networking Symposium (GIIS)

  13. arXiv:1904.01508  [pdf

    cs.NI cs.LG stat.ML

    Detection of LDDoS Attacks Based on TCP Connection Parameters

    Authors: Michael Siracusano, Stavros Shiaeles, Bogdan Ghita

    Abstract: Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy. They force vulnerable webservers to open all available connections to the adversary, denying resources to real users. Mitigation advice focuses on solutions that potentially degrade quality of service for legitimate connections. Furthermore, without accurate detection mechanisms, distributed at… ▽ More

    Submitted 12 March, 2019; originally announced April 2019.