Next Issue
Volume 2, September
Previous Issue
Volume 2, March
 
 

J. Cybersecur. Priv., Volume 2, Issue 2 (June 2022) – 11 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
26 pages, 2054 KiB  
Article
An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity
by Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr. and Kalyan Perumalla
J. Cybersecur. Priv. 2022, 2(2), 418-443; https://doi.org/10.3390/jcp2020022 - 15 Jun 2022
Cited by 2 | Viewed by 4259
Abstract
This paper presents our research approach and findings towards maximizing the accuracy of our classifier of feature claims for cybersecurity literature analytics, and introduces the resulting model ClaimsBERT. Its architecture, after extensive evaluations of different approaches, introduces a feature map concatenated with a [...] Read more.
This paper presents our research approach and findings towards maximizing the accuracy of our classifier of feature claims for cybersecurity literature analytics, and introduces the resulting model ClaimsBERT. Its architecture, after extensive evaluations of different approaches, introduces a feature map concatenated with a Bidirectional Encoder Representation from Transformers (BERT) model. We discuss deployment of this new concept and the research insights that resulted in the selection of Convolution Neural Networks for its feature mapping aspects. We also present our results showing ClaimsBERT to outperform all other evaluated approaches. This new claims classifier represents an essential processing stage within our vetting framework aiming to improve the cybersecurity of industrial control systems (ICS). Furthermore, in order to maximize the accuracy of our new ClaimsBERT classifier, we propose an approach for optimal architecture selection and determination of optimized hyperparameters, in particular the best learning rate, number of convolutions, filter sizes, activation function, the number of dense layers, as well as the number of neurons and the drop-out rate for each layer. Fine-tuning these hyperparameters within our model led to an increase in classification accuracy from 76% obtained with BertForSequenceClassification’s original model to a 97% accuracy obtained with ClaimsBERT. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

16 pages, 283 KiB  
Article
Checked and Approved? Human Resources Managers’ Uses of Social Media for Cybervetting
by Michel Walrave, Joris Van Ouytsel, Kay Diederen and Koen Ponnet
J. Cybersecur. Priv. 2022, 2(2), 402-417; https://doi.org/10.3390/jcp2020021 - 8 Jun 2022
Cited by 1 | Viewed by 5423
Abstract
Human resource (HR) professionals who assess job candidates may engage in cybervetting, the collection and analysis of applicants’ personal information available on social network sites (SNS). This raises important questions about the privacy of job applicants. In this study, interviews were conducted with [...] Read more.
Human resource (HR) professionals who assess job candidates may engage in cybervetting, the collection and analysis of applicants’ personal information available on social network sites (SNS). This raises important questions about the privacy of job applicants. In this study, interviews were conducted with 24 HR professionals from profit and governmental organizations to examine how information found on SNS is used to screen job applicants. HR managers were found to check for possible mismatches between the online information and the experiences and competences claimed by candidates. Pictures of the job candidates’ spare time activities, drinking behavior, and physical appearance are seen as very informative. Pictures posted by job candidates’ connections are valued as more informative than those posted by the applicants themselves. Governmental organizations’ HR managers differ from profit-sector professionals by the fact that political views may play a role for the former. Finally, some HR professionals do not collect personal information about job candidates through social media, since they aim to respect a clear distinction between private life and work. They do not want to be influenced by information that has no relation with candidates’ qualifications. The study’s implications for theory and practice are also discussed. Full article
(This article belongs to the Special Issue Cyber Situational Awareness Techniques and Human Factors)
23 pages, 1964 KiB  
Article
Improved Detection and Response via Optimized Alerts: Usability Study
by Griffith Russell McRee
J. Cybersecur. Priv. 2022, 2(2), 379-401; https://doi.org/10.3390/jcp2020020 - 31 May 2022
Cited by 2 | Viewed by 5785
Abstract
Security analysts working in the modern threat landscape face excessive events and alerts, a high volume of false-positive alerts, significant time constraints, innovative adversaries, and a staggering volume of unstructured data. Organizations thus risk data breach, loss of valuable human resources, reputational damage, [...] Read more.
Security analysts working in the modern threat landscape face excessive events and alerts, a high volume of false-positive alerts, significant time constraints, innovative adversaries, and a staggering volume of unstructured data. Organizations thus risk data breach, loss of valuable human resources, reputational damage, and impact to revenue when excessive security alert volume and a lack of fidelity degrade detection services. This study examined tactics to reduce security data fatigue, increase detection accuracy, and enhance security analysts’ experience using security alert output generated via data science and machine learning models. The research determined if security analysts utilizing this security alert data perceive a statistically significant difference in usability between security alert output that is visualized versus that which is text-based. Security analysts benefit two-fold: the efficiency of results derived at scale via ML models, with the additional benefit of quality alert results derived from these same models. This quantitative, quasi-experimental, explanatory study conveys survey research performed to understand security analysts’ perceptions via the Technology Acceptance Model. The population studied was security analysts working in a defender capacity, analyzing security monitoring data and alerts. The more specific sample was security analysts and managers in Security Operation Center (SOC), Digital Forensic and Incident Response (DFIR), Detection and Response Team (DART), and Threat Intelligence (TI) roles. Data analysis indicated a significant difference in security analysts’ perception of usability in favor of visualized alert output over text alert output. The study’s results showed how organizations can more effectively combat external threats by emphasizing visual rather than textual alerts. Full article
(This article belongs to the Collection Machine Learning and Data Analytics for Cyber Security)
Show Figures

Figure 1

21 pages, 411 KiB  
Review
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
by Haozhe Zhou, Amin Milani Fard and Adetokunbo Makanju
J. Cybersecur. Priv. 2022, 2(2), 358-378; https://doi.org/10.3390/jcp2020019 - 27 May 2022
Cited by 29 | Viewed by 12206
Abstract
Smart contracts are self-executing programs that run on the blockchain and make it possible for peers to enforce agreements without a third-party guarantee. The smart contract on Ethereum is the fundamental element of decentralized finance with billions of US dollars in value. Smart [...] Read more.
Smart contracts are self-executing programs that run on the blockchain and make it possible for peers to enforce agreements without a third-party guarantee. The smart contract on Ethereum is the fundamental element of decentralized finance with billions of US dollars in value. Smart contracts cannot be changed after deployment and hence the code needs to be verified for potential vulnerabilities. However, smart contracts are far from being secure and attacks exploiting vulnerabilities that have led to losses valued in the millions. In this work, we explore the current state of smart contracts security, prevalent vulnerabilities, and security-analysis tool support, through reviewing the latest advancement and research published in the past five years. We study 13 vulnerabilities in Ethereum smart contracts and their countermeasures, and investigate nine security-analysis tools. Our findings indicate that a uniform set of smart contract vulnerability definitions does not exist in research work and bugs pertaining to the same mechanisms sometimes appear with different names. This inconsistency makes it difficult to identify, categorize, and analyze vulnerabilities. We explain some safeguarding approaches and best practices. However, as technology improves new vulnerabilities may emerge. Regarding tool support, SmartCheck, DefectChecker, contractWard, and sFuzz tools are better choices in terms of more coverage of vulnerabilities; however, tools such as NPChecker, MadMax, Osiris, and Sereum target some specific categories of vulnerabilities if required. While contractWard is relatively fast and more accurate, it can only detect pre-defined vulnerabilities. The NPChecker is slower, however, can find new vulnerability patterns. Full article
Show Figures

Figure 1

29 pages, 659 KiB  
Systematic Review
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review
by Faiza Tazi, Sunny Shrestha, Junibel De La Cruz and Sanchari Das
J. Cybersecur. Priv. 2022, 2(2), 329-357; https://doi.org/10.3390/jcp2020018 - 27 May 2022
Cited by 7 | Viewed by 8092
Abstract
The World Wide Web (www) consists of the surface web, deep web, and Dark Web, depending on the content shared and the access to these network layers. Dark Web consists of the Dark Net overlay of networks that can be accessed through specific [...] Read more.
The World Wide Web (www) consists of the surface web, deep web, and Dark Web, depending on the content shared and the access to these network layers. Dark Web consists of the Dark Net overlay of networks that can be accessed through specific software and authorization schema. Dark Net has become a growing community where users focus on keeping their identities, personal information, and locations secret due to the diverse population base and well-known cyber threats. Furthermore, not much is known of Dark Net from the user perspective, where often there is a misunderstanding of the usage strategies. To understand this further, we conducted a systematic analysis of research relating to Dark Net privacy and security on N=200 academic papers, where we also explored the user side. An evaluation of secure end-user experience on the Dark Net establishes the motives of account initialization in overlaid networks such as Tor. This work delves into the evolution of Dark Net intelligence for improved cybercrime strategies across jurisdictions. The evaluation of the developing network infrastructure of the Dark Net raises meaningful questions on how to resolve the issue of increasing criminal activity on the Dark Web. We further examine the security features afforded to users, motives, and anonymity revocation. We also evaluate more closely nine user-study-focused papers revealing the importance of conducting more research in this area. Our detailed systematic review of Dark Net security clearly shows the apparent research gaps, especially in the user-focused studies emphasized in the paper. Full article
(This article belongs to the Special Issue Cyber Situational Awareness Techniques and Human Factors)
Show Figures

Figure 1

18 pages, 658 KiB  
Article
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration
by Niusen Chen and Bo Chen
J. Cybersecur. Priv. 2022, 2(2), 311-328; https://doi.org/10.3390/jcp2020017 - 26 May 2022
Cited by 2 | Viewed by 4614
Abstract
Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools. This work aims to address this problem in the context of mobile [...] Read more.
Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools. This work aims to address this problem in the context of mobile devices. As real-world malware is very heterogeneous, we narrow down the scope of our work by especially focusing on a special type of OS-level malware that always corrupts user data. We have designed mobiDOM, the first framework that can combat the OS-level data corruption malware for mobile computing devices. Our mobiDOM contains two components, a malware detector and a data repairer. The malware detector can securely and timely detect the presence of OS-level malware by fully utilizing the existing hardware features of a mobile device, namely, flash memory and Arm TrustZone. Specifically, we integrate the malware detection into the flash translation layer (FTL), a firmware layer embedded into the flash storage hardware, which is inaccessible to the OS; in addition, we run a trusted application in the Arm TrustZone secure world, which acts as a user-level manager of the malware detector. The FTL-based malware detection and the TrustZone-based manager can communicate with each other stealthily via steganography. The data repairer can allow restoring the external storage to a healthy historical state by taking advantage of the out-of-place-update feature of flash memory and our malware-aware garbage collection in the FTL. Security analysis and experimental evaluation on a real-world testbed confirm the effectiveness of mobiDOM. Full article
(This article belongs to the Special Issue Secure Software Engineering)
Show Figures

Figure 1

19 pages, 2532 KiB  
Article
Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols
by Caspar Schwarz-Schilling, Sheng-Nan Li and Claudio J. Tessone
J. Cybersecur. Priv. 2022, 2(2), 292-310; https://doi.org/10.3390/jcp2020016 - 20 May 2022
Cited by 9 | Viewed by 4191
Abstract
In blockchain-based systems whose consensus mechanisms resort to Proof-of-Work (PoW), it is expected that a miner’s share of total block revenue is proportional to their share of hashing power with respect to the rest of the network. The protocol relies on the immediate [...] Read more.
In blockchain-based systems whose consensus mechanisms resort to Proof-of-Work (PoW), it is expected that a miner’s share of total block revenue is proportional to their share of hashing power with respect to the rest of the network. The protocol relies on the immediate broadcast of blocks by miners, to earn precedence in peers’ local blockchains. However, a deviation from this strategy named selfish mining (SM), may lead miners to earn more than their “fair share”. In this paper, we introduce an agent-based model to simulate the dynamics of SM behaviour by a single miner as well as mining pools to understand the influence of (a) mining power distribution, (b) overlay network topology, (c) positioning of the selfish nodes within the peer to peer network. Our minimalistic model allows us to find that in high levels of latency, SM is always a more profitable strategy; our results are very robust to different network topologies and mining nodes’ centrality in the network. Moreover, the power-law distribution of the miners’ hashing power can make it harder for a selfish miner to be profitable. In addition, we analyze the effect of SM on system global efficiency and fairness. Our analysis confirms that SM is always more profitable for hashing powers representing more than one-third of the total computing power. Further, it also confirms that SM behaviour could cause a statistically significant high probability of continuously mined blocks opening the door for empirical verification of the phenomenon. Full article
(This article belongs to the Section Cryptography and Cryptology)
Show Figures

Figure 1

16 pages, 555 KiB  
Article
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams
by Hannes Salin and Martin Lundgren
J. Cybersecur. Priv. 2022, 2(2), 276-291; https://doi.org/10.3390/jcp2020015 - 13 Apr 2022
Cited by 5 | Viewed by 7928
Abstract
In this study, a framework was developed, based on a literature review, to help managers incorporate cybersecurity risk management in agile development projects. The literature review used predefined codes that were developed by extending previously defined challenges in the literature—for developing secure software [...] Read more.
In this study, a framework was developed, based on a literature review, to help managers incorporate cybersecurity risk management in agile development projects. The literature review used predefined codes that were developed by extending previously defined challenges in the literature—for developing secure software in agile projects—to include aspects of agile cybersecurity risk management. Five steps were identified based on the insights gained from how the reviewed literature has addressed each of the challenges: (1) risk collection; (2) risk refinement; (3) risk mitigation; (4) knowledge transfer; and (5) escalation. To assess the appropriateness of the identified steps, and to determine their inclusion or exclusion in the framework, a survey was submitted to 145 software developers using a four-point Likert scale to measure the attitudes towards each step. The resulting framework presented herein serves as a starting point to help managers and developers structure their agile projects in terms of cybersecurity risk management, supporting less overloaded agile processes, stakeholder insights on relevant risks, and increased security assurance. Full article
(This article belongs to the Special Issue Secure Software Engineering)
Show Figures

Figure 1

19 pages, 827 KiB  
Review
Using Blockchain for Data Collection in the Automotive Industry Sector: A Literature Review
by Abdulghafour Mohammad, Sergio Vargas and Pavel Čermák
J. Cybersecur. Priv. 2022, 2(2), 257-275; https://doi.org/10.3390/jcp2020014 - 13 Apr 2022
Cited by 9 | Viewed by 6885
Abstract
Today’s cars can share data with other cars, automakers, and service providers. Shared data can help improve the driving experience, the performance of the car, and the traffic situations. Among all data-collection techniques, blockchain technology offers an immutable and secure solution to support [...] Read more.
Today’s cars can share data with other cars, automakers, and service providers. Shared data can help improve the driving experience, the performance of the car, and the traffic situations. Among all data-collection techniques, blockchain technology offers an immutable and secure solution to support data collection in the automotive industry. Despite its advantages, collecting auto data with blockchain still faces several challenges. Thus, the purpose of this study was to conduct a review of published articles that have addressed the challenges of adopting blockchain for data collection in the automotive industry. This paper allowed us to answer the predefined research question: “What are the challenges of using blockchain for data collection in the automotive industry as presented in the published literature?” The review included articles published from 2017 to January 2022, and from the screened records, 13 articles were analyzed in full-text form. The founded challenges were categorized into seven categories: connectivity, privacy, security attacks, scalability, performance, costs, and monetizing. This review will help researchers, car manufacturers, and third-party suppliers to assess the applicability of the blockchain for data collection. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

12 pages, 416 KiB  
Viewpoint
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
by Francesco Di Nocera and Giorgia Tempestini
J. Cybersecur. Priv. 2022, 2(2), 245-256; https://doi.org/10.3390/jcp2020013 - 28 Mar 2022
Cited by 5 | Viewed by 8657
Abstract
The usability/security trade-off indicates the inversely proportional relationship that seems to exist between usability and security. The more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. So far, attempts to reduce the [...] Read more.
The usability/security trade-off indicates the inversely proportional relationship that seems to exist between usability and security. The more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. So far, attempts to reduce the gap between usability and security have been unsuccessful. In this paper, we offer a theoretical perspective to exploit this tradeoff rather than fight it, as well as a practical approach to the use of contextual improvements in system usability to reward secure behavior. The theoretical perspective, based on the concept of reinforcement, has been successfully applied to several domains, and there is no reason to believe that the cybersecurity domain will represent an exception. Although the purpose of this article is to devise a research agenda, we also provide an example based on a single-case study where we apply the rationale underlying our proposal in a laboratory experiment. Full article
(This article belongs to the Special Issue Cyber Situational Awareness Techniques and Human Factors)
Show Figures

Figure 1

25 pages, 2012 KiB  
Article
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies
by Emmanuel Aboah Boateng and J. W. Bruce
J. Cybersecur. Priv. 2022, 2(2), 220-244; https://doi.org/10.3390/jcp2020012 - 24 Mar 2022
Cited by 8 | Viewed by 7812
Abstract
The security of programmable logic controllers (PLCs) that control industrial systems is becoming increasingly critical due to the ubiquity of the Internet of Things technologies and increasingly nefarious cyber-attack activity. Conventional techniques for safeguarding PLCs are difficult due to their unique architectures. This [...] Read more.
The security of programmable logic controllers (PLCs) that control industrial systems is becoming increasingly critical due to the ubiquity of the Internet of Things technologies and increasingly nefarious cyber-attack activity. Conventional techniques for safeguarding PLCs are difficult due to their unique architectures. This work proposes a one-class support vector machine, one-class neural network interconnected in a feed-forward manner, and isolation forest approaches for verifying PLC process integrity by monitoring PLC memory addresses. A comprehensive experiment is conducted using an open-source PLC subjected to multiple attack scenarios. A new histogram-based approach is introduced to visualize anomaly detection algorithm performance and prediction confidence. Comparative performance analyses of the proposed algorithms using decision scores and prediction confidence are presented. Results show that isolation forest outperforms one-class neural network, one-class support vector machine, and previous work, in terms of accuracy, precision, recall, and F1-score on seven attack scenarios considered. Statistical hypotheses tests involving analysis of variance and Tukey’s range test were used to validate the presented results. Full article
(This article belongs to the Collection Machine Learning and Data Analytics for Cyber Security)
Show Figures

Graphical abstract

Previous Issue
Next Issue
Back to TopTop