Skip to main content

Showing 1–28 of 28 results for author: Ferrag, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.12750  [pdf, other

    cs.CR cs.AI

    Generative AI and Large Language Models for Cyber Security: All Insights You Need

    Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi

    Abstract: This paper provides a comprehensive review of the future of cybersecurity through Generative AI and Large Language Models (LLMs). We explore LLM applications across various domains, including hardware design security, intrusion detection, software engineering, design verification, cyber threat intelligence, malware detection, and phishing detection. We present an overview of LLM evolution and its… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: 50 pages, 8 figures

  2. arXiv:2405.04874  [pdf, other

    cs.CR

    Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities

    Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke

    Abstract: Critical National Infrastructure (CNI) encompasses a nation's essential assets that are fundamental to the operation of society and the economy, ensuring the provision of vital utilities such as energy, water, transportation, and communication. Nevertheless, growing cybersecurity threats targeting these infrastructures can potentially interfere with operations and seriously risk national security… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  3. arXiv:2404.18353  [pdf, other

    cs.CR cs.AI cs.PL

    Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models

    Authors: Norbert Tihanyi, Tamas Bisztray, Mohamed Amine Ferrag, Ridhi Jain, Lucas C. Cordeiro

    Abstract: This study provides a comparative analysis of state-of-the-art large language models (LLMs), analyzing how likely they generate vulnerabilities when writing simple C programs using a neutral zero-shot prompt. We address a significant gap in the literature concerning the security properties of code produced by these models without specific directives. N. Tihanyi et al. introduced the FormAI dataset… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  4. arXiv:2402.07688  [pdf, other

    cs.AI cs.CR

    CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge

    Authors: Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamas Bisztray, Merouane Debbah

    Abstract: Large Language Models (LLMs) are increasingly used across various domains, from software development to cyber threat intelligence. Understanding all the different fields of cybersecurity, which includes topics such as cryptography, reverse engineering, and risk assessment, poses a challenge even for human experts. To accurately test the general knowledge of LLMs in cybersecurity, the research comm… ▽ More

    Submitted 3 June, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

  5. arXiv:2401.14780  [pdf, other

    cs.IT

    Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

    Authors: Bui Duc Son, Nguyen Tien Hoa, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi, Merouane Debbah

    Abstract: The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adver… ▽ More

    Submitted 28 January, 2024; v1 submitted 26 January, 2024; originally announced January 2024.

    Comments: 17 pages, 5 figures, and 4 tables. Submitted for publications

  6. arXiv:2311.14308  [pdf, other

    cs.CR

    Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing

    Authors: Messaoud Babaghayou, Noureddine Chaib, Leandros Maglaras, Yagmur Yigit, Mohamed Amine Ferrag

    Abstract: This paper addresses the challenge of efficiently offloading heavy computing tasks from ground mobile devices to the satellite-based mist computing environment. With ground-based edge and cloud servers often being inaccessible, the exploitation of satellite mist computing becomes imperative. Existing offloading algorithms have shown limitations in adapting to the unique characteristics of heavy co… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Comments: 8 pages

  7. arXiv:2311.12849  [pdf, other

    cs.DC

    Reliability Analysis of Fault Tolerant Memory Systems

    Authors: Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos

    Abstract: This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modeled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction with Single Error Correction and Double Error Detection (SEC-DED) codes. It explores three primary models: 1) Exponentially distributed scrubbing, invo… ▽ More

    Submitted 23 November, 2023; v1 submitted 16 October, 2023; originally announced November 2023.

    Comments: 6 pages

  8. ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance

    Authors: Mohamed C. Ghanem, Thomas M. Chen, Mohamed A. Ferrag, Mohyi E. Kettouche

    Abstract: The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Security Compliance (SC) methods to identify security gaps and anticipate security breaches. In the computer networks context and despite the use of autonomo… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  9. arXiv:2307.06616  [pdf, other

    cs.CR cs.AI

    SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection with LLMs?

    Authors: Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi, Ridhi Jain, Diana Maimut, Fatima Alwahedi, Thierry Lestable, Narinderjit Singh Thandi, Abdechakour Mechri, Merouane Debbah, Lucas C. Cordeiro

    Abstract: Software vulnerabilities can cause numerous problems, including crashes, data loss, and security breaches. These issues greatly compromise quality and can negatively impact the market adoption of software applications and systems. Traditional bug-fixing methods, such as static analysis, often produce false positives. While bounded model checking, a form of Formal Verification (FV), can provide mor… ▽ More

    Submitted 29 May, 2024; v1 submitted 13 July, 2023; originally announced July 2023.

  10. The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification

    Authors: Norbert Tihanyi, Tamas Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis

    Abstract: This paper presents the FormAI dataset, a large collection of 112, 000 AI-generated compilable and independent C programs with vulnerability classification. We introduce a dynamic zero-shot prompting technique constructed to spawn diverse programs utilizing Large Language Models (LLMs). The dataset is generated by GPT-3.5-turbo and comprises programs with varying levels of complexity. Some program… ▽ More

    Submitted 28 March, 2024; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: https://github.com/FormAI-Dataset PLEASE USE PUBLISHED VERSION FOR CITATION: https://doi.org/10.1145/3617555.3617874

    Journal ref: PROMISE 2023: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering December 2023 Pages 33 to 43

  11. arXiv:2306.14263  [pdf, other

    cs.CR cs.AI

    Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices

    Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi

    Abstract: The field of Natural Language Processing (NLP) is currently undergoing a revolutionary transformation driven by the power of pre-trained Large Language Models (LLMs) based on groundbreaking Transformer architectures. As the frequency and diversity of cybersecurity attacks continue to rise, the importance of incident detection has significantly increased. IoT devices are expanding rapidly, resultin… ▽ More

    Submitted 8 February, 2024; v1 submitted 25 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted for publication in IEEE Access: http://dx.doi.org/10.1109/ACCESS.2024.3363469

  12. arXiv:2306.10309  [pdf, other

    cs.CR

    Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

    Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo

    Abstract: The ongoing deployment of the fifth generation (5G) wireless networks constantly reveals limitations concerning its original concept as a key driver of Internet of Everything (IoE) applications. These 5G challenges are behind worldwide efforts to enable future networks, such as sixth generation (6G) networks, to efficiently support sophisticated applications ranging from autonomous driving capabil… ▽ More

    Submitted 8 February, 2024; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted for publication in IEEE Communications Surveys \& Tutorials

  13. arXiv:2305.14752  [pdf, other

    cs.SE cs.AI cs.FL cs.LG

    A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification

    Authors: Norbert Tihanyi, Ridhi Jain, Yiannis Charalambous, Mohamed Amine Ferrag, Youcheng Sun, Lucas C. Cordeiro

    Abstract: This paper introduces an innovative approach that combines Large Language Models (LLMs) with Formal Verification strategies for automatic software vulnerability repair. Initially, we employ Bounded Model Checking (BMC) to identify vulnerabilities and extract counterexamples. These counterexamples are supported by mathematical proofs and the stack trace of the vulnerabilities. Using a specially des… ▽ More

    Submitted 27 June, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

  14. arXiv:2304.05644  [pdf, other

    cs.CR

    Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things

    Authors: Mohamed Amine Ferrag, Djallel Hamouda, Merouane Debbah, Leandros Maglaras, Abderrahmane Lakas

    Abstract: While the benefits of 6G-enabled Internet of Things (IoT) are numerous, providing high-speed, low-latency communication that brings new opportunities for innovation and forms the foundation for continued growth in the IoT industry, it is also important to consider the security challenges and risks associated with the technology. In this paper, we propose a two-stage intrusion detection framework f… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: The paper is accepted and will be published in the IEEE DCOSS-IoT 2023 Conference Proceedings

  15. arXiv:2303.11751  [pdf, other

    cs.CR

    Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks

    Authors: Mohamed Amine Ferrag, Merouane Debbah, Muna Al-Hawawreh

    Abstract: The next generation of cellular technology, 6G, is being developed to enable a wide range of new applications and services for the Internet of Things (IoT). One of 6G's main advantages for IoT applications is its ability to support much higher data rates and bandwidth as well as to support ultra-low latency. However, with this increased connectivity will come to an increased risk of cyber threats,… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: The paper is accepted and will be published in the IEEE/ACM CCGrid 2023 Conference Proceedings

  16. arXiv:2303.11745  [pdf, other

    cs.CR cs.AI

    Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study

    Authors: Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Merouane Debbah, Kim-Kwang Raymond Choo

    Abstract: Federated edge learning can be essential in supporting privacy-preserving, artificial intelligence (AI)-enabled activities in digital twin 6G-enabled Internet of Things (IoT) environments. However, we need to also consider the potential of attacks targeting the underlying AI systems (e.g., adversaries seek to corrupt data on the IoT devices during local updates or corrupt the model updates); hence… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: The paper is accepted and will be published in the IEEE ICC 2023 Conference Proceedings

  17. arXiv:2112.08431  [pdf, other

    cs.CR

    Cybersecurity Revisited: Honeytokens meet Google Authenticator

    Authors: Vasilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke

    Abstract: Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor authentication process. The current implementation c… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 6 pages, 1 figure

  18. arXiv:2012.08782  [pdf, other

    cs.CR

    A novel Two-Factor HoneyToken Authentication Mechanism

    Authors: Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris

    Abstract: The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regar… ▽ More

    Submitted 20 January, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: 7 pages, 6 figures

  19. arXiv:1901.09374  [pdf, other

    cs.CR

    Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab

    Abstract: Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The differen… ▽ More

    Submitted 27 January, 2019; originally announced January 2019.

    Comments: 13 pages, figure 6, tables 5

  20. arXiv:1901.03899  [pdf, other

    cs.CR

    Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

    Authors: Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis

    Abstract: As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are… ▽ More

    Submitted 12 January, 2019; originally announced January 2019.

  21. arXiv:1812.09059  [pdf, other

    cs.CR

    A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models

    Authors: Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke

    Abstract: This paper proposes a novel intrusion detection system (IDS) that combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. Specifically, the first and second method take as inputs features of the data set, and classify the network traffic as Attack/Benign. The third classifier uses features of the initial da… ▽ More

    Submitted 21 December, 2018; originally announced December 2018.

    Comments: 6 pages, 1 figure

  22. Blockchain Technologies for the Internet of Things: Research Issues and Challenges

    Authors: Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke

    Abstract: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.

    Comments: 14 pages, 5 figures

  23. arXiv:1803.10281  [pdf, other

    cs.CR

    Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke

    Abstract: This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we describe and give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdrop**-based at… ▽ More

    Submitted 8 March, 2019; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: 22 pages, 9 figures

  24. arXiv:1711.00525  [pdf, other

    cs.CR

    Internet of Cloud: Security and Privacy issues

    Authors: Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke

    Abstract: The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that the… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 27 pages, 4 figures

  25. arXiv:1708.04027  [pdf, other

    cs.CR

    Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke

    Abstract: This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against… ▽ More

    Submitted 14 August, 2017; originally announced August 2017.

    Comments: 24 pages, 14 figures

  26. arXiv:1612.07206  [pdf, other

    cs.CR

    Authentication Protocols for Internet of Things: A Comprehensive Survey

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Inte… ▽ More

    Submitted 21 December, 2016; originally announced December 2016.

    Comments: 62 pages, 8 figures

  27. arXiv:1611.07722  [pdf, other

    cs.CR

    A Survey on Privacy-preserving Schemes for Smart Grid Communications

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. Based on the communication and system models, we classify these schemes that are published between 2013 and 2016, in five categories, including, 1) Smart… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 30 pages, 13 figures, 15 tables

  28. arXiv:1610.06095  [pdf, other

    cs.CR

    Privacy-preserving schemes for Ad Hoc Social Networks: A survey

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim

    Abstract: In this paper, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically, we select and in-detail examine thirty-three privacy preserving schemes developed for or applied in the context of ad hoc social networks. These schemes are published between 2008 and 2016. Based on this… ▽ More

    Submitted 19 October, 2016; originally announced October 2016.

    Comments: 27 pages, 7 figures