Skip to main content

Showing 1–6 of 6 results for author: Ghanem, M C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05602  [pdf

    cs.CR cs.ET cs.NI

    AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments

    Authors: Mohammed Ashfaaq M. Farzaan, Mohamed Chahine Ghanem, Ayman El-Hajjar, Deepthi N. Ratnayake

    Abstract: The escalating sophistication and volume of cyber threats in cloud environments necessitate a paradigm shift in strategies. Recognising the need for an automated and precise response to cyber threats, this research explores the application of AI and ML and proposes an AI-powered cyber incident response system for cloud environments. This system, encompassing Network Traffic Classification, Web Int… ▽ More

    Submitted 10 April, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

  2. A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response

    Authors: Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem

    Abstract: Intrusion detection systems perform post-compromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analysed and triaged by security analysts. This process is largely manual, tedious and time-consuming. Alert correlation is a technique that tries to reduce the number of intrusion… ▽ More

    Submitted 9 December, 2023; v1 submitted 2 December, 2023; originally announced December 2023.

    Comments: version 2.4

  3. A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response

    Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes… ▽ More

    Submitted 3 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: version 2 post peer review Forensic Science International Digital Investigation

    Report number: Volume 48, 301675

    Journal ref: Forensic Science International: Digital Investigation, 2024

  4. arXiv:2309.05537  [pdf

    cs.CR cs.IR cs.NI cs.OS

    D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

    Authors: Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin

    Abstract: The use of the un-indexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is an in-famously dangerous place where all kinds of criminal activities take place [1-2], despite advances in web forensics techniques, tools, and methodologies, few studies have formally tackled the dark and deep web fo… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  5. ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance

    Authors: Mohamed C. Ghanem, Thomas M. Chen, Mohamed A. Ferrag, Mohyi E. Kettouche

    Abstract: The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Security Compliance (SC) methods to identify security gaps and anticipate security breaches. In the computer networks context and despite the use of autonomo… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  6. arXiv:2307.07293  [pdf

    cs.CR cs.MM

    StegoHound: A Novel Multi-Approaches Method for Efficient and Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files

    Authors: Mohamed C. Ghanem, Maider D. Uribarri, Ramzi Djemai, Dipo Dunsin, Istteffanny I. Araujo

    Abstract: Anti-forensics techniques particularly steganography and cryptography have become increasingly pressing issues that affect the current digital forensics practice. This paper advances the automation of hidden evidence extraction in the context of audio files by proposing a novel multi-approaches method which enables the correlation between unprocessed artefacts, indexed and live forensics analysis… ▽ More

    Submitted 10 December, 2023; v1 submitted 14 July, 2023; originally announced July 2023.

    Comments: Journal of Information Security and Cybercrimes Research- Post Review V3.1

    Report number: ol. 6, no. 2, pp. 89-104

    Journal ref: JISCR 2023