You are currently viewing a new version of our website. To view the old version click .

62 Results Found

  • Article
  • Open Access
57 Citations
15,131 Views
22 Pages

CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques

  • Octavian Grigorescu,
  • Andreea Nica,
  • Mihai Dascalu and
  • Razvan Rughinis

31 August 2022

Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has emerged as a means to prevent and fight cybercrime. Attempts already exist in this regard. The C...

  • Communication
  • Open Access
90 Citations
19,685 Views
14 Pages

Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework

  • Anna Georgiadou,
  • Spiros Mouzakitis and
  • Dimitris Askounis

9 May 2021

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures. Its innovative approach has been broadly welcomed by both vendors and...

  • Article
  • Open Access
16 Citations
9,749 Views
19 Pages

10 April 2024

Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the siz...

  • Article
  • Open Access
26 Citations
10,027 Views
18 Pages

Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Tirthankar Ghosh,
  • Russel Plenkers,
  • Tom McElroy,
  • Stephan Dulaney and
  • Sajida Shabanali

11 January 2023

With the rapid rate at which networking technologies are changing, there is a need to regularly update network activity datasets to accurately reflect the current state of network infrastructure/traffic. The uniqueness of this work was that this was...

  • Article
  • Open Access
16 Citations
7,028 Views
22 Pages

24 October 2022

With advances in cyber threats and increased intelligence, incidents continue to occur related to new ways of using new technologies. In addition, as intelligent and advanced cyberattack technologies gradually increase, the limit of inefficient malic...

  • Article
  • Open Access
3 Citations
4,016 Views
18 Pages

Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Michael Plain,
  • Jadarius Hill and
  • Marshall Elam

There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of this research lies in visually or graphically representing the Reconnaissance Tactic (TA00...

  • Article
  • Open Access
23 Citations
5,852 Views
24 Pages

Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework

  • Aybars Oruc,
  • Ahmed Amro and
  • Vasileios Gkioulos

12 November 2022

Shipping performed by contemporary vessels is the backbone of global trade. Modern vessels are equipped with many computerized systems to enhance safety and operational efficiency. One such system developed is the integrated navigation system (INS),...

  • Article
  • Open Access
36 Citations
10,049 Views
18 Pages

Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework

  • Yonghyun Jo,
  • Oongjae Choi,
  • Jiwoon You,
  • Youngkyun Cha and
  • Dong Hoon Lee

26 February 2022

Cybersecurity is important on ships that use information and communication technology. On such ships, the work, control, and sensor systems are connected for steering, navigation, and cargo management inside the hull, and a cyberattack can have physi...

  • Article
  • Open Access
13 Citations
6,711 Views
13 Pages

23 January 2022

In recent years, cyber attacks against critical infrastructure have been increasing and are becoming stealthy and persistent. Attackers or malware may be hiding in the system after penetration to collect system information. They would further make la...

  • Article
  • Open Access
462 Views
31 Pages

13 November 2025

Cyber Threat Intelligence (CTI) reports are essential resources for identifying the Tactics, Techniques, and Procedures (TTPs) of hackers and cyber threat actors. However, these reports are often lengthy and unstructured, which limits their suitabili...

  • Data Descriptor
  • Open Access
3 Citations
3,339 Views
28 Pages

Introducing UWF-ZeekData24: An Enterprise MITRE ATT&CK Labeled Network Attack Traffic Dataset for Machine Learning/AI

  • Marshall Elam,
  • Dustin Mink,
  • Sikha S. Bagui,
  • Russell Plenkers and
  • Subhash C. Bagui

25 April 2025

This paper describes the creation of a new dataset, UWF-ZeekData24, aligned with the Enterprise MITRE ATT&CK Framework, that addresses critical shortcomings in existing network security datasets. Controlling the construction of attacks and meticu...

  • Article
  • Open Access
20 Citations
7,111 Views
25 Pages

Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework

  • Sikha Bagui,
  • Dustin Mink,
  • Subhash Bagui,
  • Tirthankar Ghosh,
  • Tom McElroy,
  • Esteban Paredes,
  • Nithisha Khasnavis and
  • Russell Plenkers

20 October 2022

While computer networks and the massive amount of communication taking place on these networks grow, the amount of damage that can be done by network intrusions grows in tandem. The need is for an effective and scalable intrusion detection system (ID...

  • Article
  • Open Access
7 Citations
3,606 Views
20 Pages

Analysis of Cyber-Intelligence Frameworks for AI Data Processing

  • Alberto Sánchez del Monte and
  • Luis Hernández-Álvarez

17 August 2023

This paper deals with the concept of cyber intelligence and its components as a fundamental tool for the protection of information today. After that, the main cyber-intelligence frameworks that are currently applied worldwide (Diamond Model, Cyberkil...

  • Article
  • Open Access
9 Citations
5,270 Views
18 Pages

28 February 2024

Industrial Control Systems (ICSs) have become the cornerstone of critical sectors like energy, transportation, and manufacturing. However, the burgeoning interconnectivity of ICSs has also introduced heightened risks from cyber threats. The urgency f...

  • Article
  • Open Access
3 Citations
4,672 Views
22 Pages

As the Industrial Internet of Things (IIoT) increasingly integrates with traditional networks, advanced persistent threats (APTs) pose significant risks to critical infrastructure. Traditional Intrusion Detection Systems (IDSs) and Anomaly Detection...

  • Article
  • Open Access
4 Citations
2,716 Views
37 Pages

Node Classification of Network Threats Leveraging Graph-Based Characterizations Using Memgraph

  • Sadaf Charkhabi,
  • Peyman Samimi,
  • Sikha S. Bagui,
  • Dustin Mink and
  • Subhash C. Bagui

This research leverages Memgraph, an open-source graph database, to analyze graph-based network data and apply Graph Neural Networks (GNNs) for a detailed classification of cyberattack tactics categorized by the MITRE ATT&CK framework. As part of...

  • Review
  • Open Access
2 Citations
13,753 Views
39 Pages

Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools

  • Paolo Modesti,
  • Lewis Golightly,
  • Louis Holmes,
  • Chidimma Opara and
  • Marco Moscini

The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by practitioners within the industry or underground communities. Similarly, academic researchers have also contributed to developing security tools. However, the...

  • Article
  • Open Access
1 Citations
2,954 Views
30 Pages

A Hybrid Approach Using Graph Neural Networks and LSTM for Attack Vector Reconstruction

  • Yelizaveta Vitulyova,
  • Tetiana Babenko,
  • Kateryna Kolesnikova,
  • Nikolay Kiktev and
  • Olga Abramkina

The escalating complexity of cyberattacks necessitates advanced strategies for their detection and mitigation. This study presents a hybrid model that integrates Graph Neural Networks (GNNs) with Long Short-Term Memory (LSTM) networks to reconstruct...

  • Article
  • Open Access
10 Citations
3,551 Views
24 Pages

Introducing the UWF-ZeekDataFall22 Dataset to Classify Attack Tactics from Zeek Conn Logs Using Spark’s Machine Learning in a Big Data Framework

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Pooja Madhyala,
  • Neha Uppal,
  • Tom McElroy,
  • Russell Plenkers,
  • Marshall Elam and
  • Swathi Prayaga

18 December 2023

This study introduces UWF-ZeekDataFall22, a newly created dataset labeled using the MITRE ATT&CK framework. Although the focus of this research is on classifying the never-before classified resource development tactic, the reconnaissance and disc...

  • Article
  • Open Access
1 Citations
3,320 Views
22 Pages

18 December 2024

In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace. This convergence brings novel security threat...

  • Article
  • Open Access
600 Views
27 Pages

Evaluation of Cyberattack Detection Models in Power Grids: Automated Generation of Attack Processes

  • Davide Cerotti,
  • Daniele Codetta Raiteri,
  • Giovanna Dondossola,
  • Lavinia Egidi,
  • Giuliana Franceschinis,
  • Luigi Portinale,
  • Davide Savarro and
  • Roberta Terruggia

2 October 2025

The recent growing adversarial activity against critical systems, such as the power grid, has raised attention on the necessity of appropriate measures to manage the related risks. In this setting, our research focuses on developing tools for early d...

  • Article
  • Open Access
7 Citations
4,669 Views
21 Pages

Labeling Network Intrusion Detection System (NIDS) Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models

  • Nir Daniel,
  • Florian Klaus Kaiser,
  • Shay Giladi,
  • Sapir Sharabi,
  • Raz Moyal,
  • Shalev Shpolyansky,
  • Andres Murillo,
  • Aviad Elyashar and
  • Rami Puzis

Analysts in Security Operations Centers (SOCs) are often occupied with time-consuming investigations of alerts from Network Intrusion Detection Systems (NIDSs). Many NIDS rules lack clear explanations and associations with attack techniques, complica...

  • Article
  • Open Access
373 Views
64 Pages

Small and Medium-sized Enterprises (SMEs) face disproportionately high risks from Advanced Persistent Threats (APTs), which often evade traditional cybersecurity measures. Existing frameworks catalogue adversary tactics and defensive solutions but pr...

  • Article
  • Open Access
3 Citations
7,440 Views
27 Pages

Enhancing Security Operations Center: Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot

  • Ismail,
  • Rahmat Kurnia,
  • Farid Widyatama,
  • Ilham Mirwansyah Wibawa,
  • Zilmas Arjuna Brata,
  • Ukasyah,
  • Ghitha Afina Nelistiani and
  • Howon Kim

31 January 2025

The sophistication of cyberthreats demands more efficient and intelligent tools to support Security Operations Centers (SOCs) in managing and mitigating incidents. To address this, we developed the Security Event Response Copilot (SERC), a system des...

  • Article
  • Open Access
14 Citations
5,355 Views
32 Pages

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

  • Hisham Ali,
  • Jawad Ahmad,
  • Zakwan Jaroucheh,
  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • Owen Lo,
  • Will Abramson and
  • William J. Buchanan

28 September 2022

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro...

  • Article
  • Open Access
1 Citations
2,413 Views
18 Pages

10 September 2025

With the growing intensity of global cybersecurity threats and the rapid advancement of attack techniques, strengthening enterprise information and communication technology (ICT) infrastructures and enhancing digital forensics have become critical im...

  • Article
  • Open Access
2,460 Views
17 Pages

As cyberattacks become increasingly sophisticated and frequent, it is crucial to develop robust cybersecurity measures that can withstand adversarial attacks. Adversarial simulation is an effective technique for evaluating the security of systems aga...

  • Feature Paper
  • Article
  • Open Access
981 Views
26 Pages

Analyzing Performance of Data Preprocessing Techniques on CPUs vs. GPUs with and Without the MapReduce Environment

  • Sikha S. Bagui,
  • Colin Eller,
  • Rianna Armour,
  • Shivani Singh,
  • Subhash C. Bagui and
  • Dustin Mink

10 September 2025

Data preprocessing is usually necessary before running most machine learning classifiers. This work compares three different preprocessing techniques, minimal preprocessing, Principal Components Analysis (PCA), and Linear Discriminant Analysis (LDA)....

  • Article
  • Open Access
5 Citations
3,844 Views
23 Pages

A Taxonomy for Threat Actors’ Delivery Techniques

  • Antonio Villalón-Huerta,
  • Ismael Ripoll-Ripoll and
  • Hector Marco-Gisbert

13 April 2022

The main contribution of this paper is to provide an accurate taxonomy for delivery techniques, which allows the detection of novel techniques and the identification of appropriate countermeasures. Delivery is a key stage for offensive cyber operatio...

  • Article
  • Open Access
4 Citations
2,772 Views
28 Pages

Graphical Representation of UWF-ZeekData22 Using Memgraph

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Dae Hyun Sung and
  • Farooq Mahmud

This work uses Memgraph, an open-source graph data platform, to analyze, visualize, and apply graph machine learning techniques to detect cybersecurity attack tactics in a newly created Zeek Conn log dataset, UWF-ZeekData22, generated in The Universi...

  • Article
  • Open Access
3 Citations
1,768 Views
30 Pages

SecuriDN: A Modeling Tool Supporting the Early Detection of Cyberattacks to Smart Energy Systems

  • Davide Cerotti,
  • Daniele Codetta Raiteri,
  • Giovanna Dondossola,
  • Lavinia Egidi,
  • Giuliana Franceschinis,
  • Luigi Portinale,
  • Davide Savarro and
  • Roberta Terruggia

6 August 2024

SecuriDN v. 0.1 is a tool for the representation of the assets composing the IT and the OT subsystems of Distributed Energy Resources (DERs) control networks and the possible cyberattacks that can threaten them. It is part of a platform that allows t...

  • Feature Paper
  • Article
  • Open Access
14 Citations
10,431 Views
20 Pages

Key Requirements for the Detection and Sharing of Behavioral Indicators of Compromise

  • Antonio Villalón-Huerta,
  • Ismael Ripoll-Ripoll and
  • Hector Marco-Gisbert

Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise. These indicators are the main source of tactical cyber intelligence most organizations benefit from. They are expressed in machine-readable formats, and they a...

  • Article
  • Open Access
791 Views
24 Pages

25 August 2025

Weapon systems have transitioned from hardware-centered designs to software-driven platforms, introducing new cybersecurity risks, including software manipulation and cyberattacks. To address these challenges, this study proposes an improved manufact...

  • Feature Paper
  • Article
  • Open Access
368 Views
17 Pages

24 November 2025

This research proposes a heterogeneous graph neural network (GNN) framework to attribute advanced persistent threat (APT) activity using enriched cyber threat intelligence (CTI). We construct a tripartite graph linking APT groups, contextualised Tact...

  • Feature Paper
  • Article
  • Open Access
6 Citations
6,550 Views
21 Pages

12 December 2022

North Korean cyber-attack groups such as Kimsuky, Lazarus, Andariel, and Venus 121 continue to attempt spear-phishing APT attacks that exploit social issues, including COVID-19. Thus, along with the worldwide pandemic of COVID-19, related threats als...

  • Article
  • Open Access
1,117 Views
35 Pages

Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment

  • Sikha S. Bagui,
  • Germano Correa Silva De Carvalho,
  • Asmi Mishra,
  • Dustin Mink,
  • Subhash C. Bagui and
  • Stephanie Eager

In an era marked by the rapid growth of the Internet of Things (IoT), network security has become increasingly critical. Traditional Intrusion Detection Systems, particularly signature-based methods, struggle to identify evolving cyber threats such a...

  • Article
  • Open Access
8 Citations
4,053 Views
24 Pages

Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources

  • Davide Cerotti,
  • Daniele Codetta-Raiteri,
  • Giovanna Dondossola,
  • Lavinia Egidi,
  • Giuliana Franceschinis,
  • Luigi Portinale and
  • Roberta Terruggia

9 July 2020

This work proposes an approach based on dynamic Bayesian networks to support the cybersecurity analysis of network-based controllers in distributed energy plants. We built a system model that exploits real world context information from both informat...

  • Communication
  • Open Access
32 Citations
5,434 Views
12 Pages

29 September 2021

During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or s...

  • Article
  • Open Access
11 Citations
3,881 Views
20 Pages

In this article, we present an experiment we conducted with discrete event simulations to analyze the effects of multi-step cyberattacks on the safety of cyber-physical systems. We show how to represent systems, their components (either software and/...

  • Article
  • Open Access
10 Citations
7,049 Views
18 Pages

20 January 2022

The detection and classification of threats in computer systems has been one of the main problems researched in Cybersecurity. As technology evolves, the tactics employed by adversaries have also become more sophisticated to evade detection systems....

  • Article
  • Open Access
1 Citations
4,688 Views
36 Pages

Automated Malware Source Code Generation via Uncensored LLMs and Adversarial Evasion of Censored Model

  • Raúl Acosta-Bermejo,
  • José Alexis Terrazas-Chavez and
  • Eleazar Aguirre-Anaya

22 August 2025

Malicious programs, commonly called malware, have had a pervasive presence in the world for nearly forty years and have continued to evolve and multiply exponentially. On the other hand, there are multiple research works focused on malware detection...

  • Article
  • Open Access
2 Citations
3,425 Views
15 Pages

17 February 2025

Large language models’ domain-specific capabilities can be enhanced through specialized datasets, yet constructing comprehensive cybersecurity datasets remains challenging due to the field’s multidisciplinary nature. We present PenQA, a n...

  • Article
  • Open Access
3 Citations
3,716 Views
23 Pages

2 February 2021

A large-scale Cyber-Physical System (CPS) such as a smart grid usually provides service to a vast number of users as a public utility. Security is one of the most vital aspects in such critical infrastructures. The existing CPS security usually consi...

  • Article
  • Open Access
510 Views
26 Pages

Relational Framework of Cyberattacks: Empirical Evidence from Multistage Incidents

  • Mikel Ferrer-Oliva,
  • José-Amelio Medina-Merodio,
  • José-Javier Martínez-Herraiz and
  • Carlos Cilleruelo-Rodríguez

21 November 2025

The increasing scale and operational complexity of cyberattacks have exposed the limitations of static taxonomies for representing multistage threat scenarios. This study addresses the need for more flexible classification models by proposing a relat...

  • Article
  • Open Access
657 Views
38 Pages

1 October 2025

Optimal sensor placement (OSP) is concerned with determining a configuration for a collection of sensors, including sensor type, number, and location, that yields the best evaluation according to a predefined measure of efficacy. Central to the OSP p...

  • Article
  • Open Access
1,818 Views
24 Pages

Resampling to Classify Rare Attack Tactics in UWF-ZeekData22

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui and
  • Sakthivel Subramaniam

14 March 2024

One of the major problems in classifying network attack tactics is the imbalanced nature of data. Typical network datasets have an extremely high percentage of normal or benign traffic and machine learners are skewed toward classes with more data; he...

  • Article
  • Open Access
15 Citations
3,962 Views
22 Pages

Game-Theoretic Decision Support for Cyber Forensic Investigations

  • Antonia Nisioti,
  • George Loukas,
  • Stefan Rass and
  • Emmanouil Panaousis

5 August 2021

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction...

  • Article
  • Open Access
671 Views
15 Pages

18 October 2025

Industrial Internet of Things (IIoT) systems are increasingly exposed to sophisticated and rapidly evolving cyber threats. In response, this work proposes a proactive threat detection framework that leverages pretrained transformer-based language mod...

  • Feature Paper
  • Article
  • Open Access
5 Citations
2,082 Views
15 Pages

3 October 2024

This study investigates the technical challenges of applying Support Vector Machines (SVM) for multi-class classification in network intrusion detection using the UWF-ZeekDataFall22 dataset, which is labeled based on the MITRE ATT&CK framework. A...

  • Article
  • Open Access
17 Citations
3,415 Views
42 Pages

Implementation of a Trust-Based Framework for Substation Defense in the Smart Grid

  • Kwasi Boakye-Boateng,
  • Ali A. Ghorbani and
  • Arash Habibi Lashkari

30 December 2023

The Smart Grid is a cyber-integrated power grid that manages electricity generation, transmission, and distribution to consumers and central to its functioning is the substation. However, integrating cyber-infrastructure into the substation has incre...

of 2