A Lightweight Security Scheme (LSS) for Wireless Node Communication for Border Surveillance System

The physical breach across the borders is a very common issue these days among nations sharing boundaries. It is controlled via proper border surveillance system. The border surveillance system is trivially a physical border intrusion detection system in which CCTV cameras are used traditionally to observe manually the presence of some intruder. Instead, we utilize the raspberry PI controller board based wireless sensor nodes fitted with raspberry PI camera for identifying the intruder.

Read more

Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs

Abstract: The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University.

Read more

End-to-End Service Monitoring for Zero-Touch Networks

In this work, we propose the Monitoring Model Generator (MMG) component to automatically construct templates for service monitoring. MMG implements a novel methodology where service deployment models and standard information models are used as inputs to generate a high-level monitoring template, called Service Monitoring Model (SMM) and built upon an ontology-based schema based on the Resource Description Framework (RDF) vocabulary.

Read more

Exploring Cybersecurity Ecosystem in the Middle East: Towards an SME Recommender System

Cyber-attacks on Small and Medium Enterprises (SMEs) are rising. However, they often lack effective strategies to prevent threats such as malware, phishing, denial of service (DoS), and others. In this recent paper from ‘Journal of Cyber Security and Mobility’, the authors first examine the current scenario of cybersecurity in the context of Middle East SMEs, then go on to review existing standards and draw up security recommendations.

Read more

Extended Abstract: Automatic Detection of HTTP Injection Attacks using Convolutional Neural Network and Deep Neural Network

In a recent paper from the Journal of Cyber Security and Mobility, deep learning techniques are used to develop models that would automatically detect injection attacks in HTTP requests.

An extended abstract is now featured on the Cybersecurity Magazine website.
The full article and results and can found on the Journal of Cyber Security and Mobility webpage: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/2263

Read more

A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks

A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks
Sihem Baccari, Mohamed Hadded, Haifa Touati, Paul Muhlethaler

VANETs aim to reduce the number of road accident victims and congestion problems while improving the quality of driving. The absence of a central control can make such a network vulnerable to various attacks, both from the outside and from the interior. In this article, a trust-based model is proposal in which each node establishes a trust relationship with its neighbors based on their behaviors during the channel access and packet forwarding process.

Read more