Time Lag-Based Modelling for Software Vulnerability Exploitation Process

With the increase in the discovery of vulnerabilities, the expected exploits occurred in various software platform has shown an increased growth with respect to time. Only after being discovered, the potential vulnerabilities might be exploited. There exists a finite time lag in the exploitation process; from the moment the hackers get information about the discovery of a vulnerability and the time required in the final exploitation.

Read more...

Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs

Abstract: The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University.

Read more...

End-to-End Service Monitoring for Zero-Touch Networks

In this work, we propose the Monitoring Model Generator (MMG) component to automatically construct templates for service monitoring. MMG implements a novel methodology where service deployment models and standard information models are used as inputs to generate a high-level monitoring template, called Service Monitoring Model (SMM) and built upon an ontology-based schema based on the Resource Description Framework (RDF) vocabulary.

Read more...

Exploring Cybersecurity Ecosystem in the Middle East: Towards an SME Recommender System

Cyber-attacks on Small and Medium Enterprises (SMEs) are rising. However, they often lack effective strategies to prevent threats such as malware, phishing, denial of service (DoS), and others. In this recent paper from ‘Journal of Cyber Security and Mobility’, the authors first examine the current scenario of cybersecurity in the context of Middle East SMEs, then go on to review existing standards and draw up security recommendations.

Read more...

Drill Down into the EU Toolbox for 5G Security

5G networks are becoming a key part of our critical infrastructure, enabling wireless networking in a broad range of scenarios from mobile broadband to massive IoT. Until recently though there has only been moderate noticeable output by national regulators on the specific security risks 5G systems are subject to.
Cybersecurity Magazine takes a look at the efforts made by the EU and its “Toolbox” to better realize guidance beyond industry standards and ensure a common security baseline at scale.

Read more...

Extended Abstract: Automatic Detection of HTTP Injection Attacks using Convolutional Neural Network and Deep Neural Network

In a recent paper from the Journal of Cyber Security and Mobility, deep learning techniques are used to develop models that would automatically detect injection attacks in HTTP requests.

An extended abstract is now featured on the Cybersecurity Magazine website.
The full article and results and can found on the Journal of Cyber Security and Mobility webpage: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/2263

Read more...