Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers. The advancement of Artificial Intelligence (AI), coupled with the prolificacy of the Internet of Things (IoT) devices are creating smart societies that are interconnected. Space exploration and satellite, drone and UAV technology have travelled a long way in recent years and some may debate that we are in the midst of a revolution; in terms of development and the increasing number of these devices being launched. But with this revolutionary progress, it presents itself with new challenges in terms of governance. The ethical implications of connecting the physical and digital worlds, and presenting the reality of a truly interconnected society, presents the realization of the concept of smart societies in reality. Drawing on 14 years of successful events on Information security, digital forensics and cybercrime, the 15th ICGS3-23 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer based systems face ever more increasing challenges, disputes and responsibilities and while the Internet has created a global platform for the exchange of ideas, goods and services, however, it has also created boundless opportunities for cyber-crime. This book presents new materials and contributes to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As a result, these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them.

Author(s): Hamid Jahankhani
Publisher: Springer
Year: 2024

Language: English

Committee
About the Conference
Contents
Strengthening Security Mechanisms of Satellites and UAVs Against Possible Attacks from Quantum Computers
1 Introduction
2 Literature Review
2.1 Quantum Key Distribution (QKD)
2.2 Post Quantum Network Security Layer
3 QKD for Satellites, Drones and UAVs
3.1 Difficulties in Implementing QKD Protocols
3.2 Existing QKD Protocols
4 The Osslayer Protocol Implementation
5 Conclusions
References
Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles
1 Introduction
2 Literature Review and Background Research
2.1 Components of UAS
2.2 Background Research Focused on UAV Operating Systems
2.3 Background on RTOS and ROS
2.4 Literature Review for RTOS and ROS
3 Experiment Methodology
3.1 Comparing Multiple Approaches on Evaluating Security of the Linux Operating Systems
4 Results
4.1 Vulnerability Scanning
4.2 Auditing
4.3 Potential Privilege Escalation Vectors
5 Validation of the Results
5.1 Vulnerability Scanning
5.2 Auditing the System
5.3 Privilege Escalation
6 Discussion and Conclusions
6.1 Limitations of the Study
6.2 Further Work
References
A Proposed Permissioned Blockchain Consensus Algorithm: Consensus Algorithm Genetically Enhanced (CAGE)
1 Introduction
1.1 Ethics and Sustainability
2 Blockchain Anatomy
3 Genetic Algorithms
4 Cage
4.1 Differences Between PoET and CAGE
5 Method
6 Results and Analysis
6.1 Transactions
6.2 Block Latency
6.3 Node Distribution
7 Conclusion
7.1 Future Work
7.2 Discussion
8 Summary
References
Data Hiding in Anti-forensics—Exploit Delivery Through Digital Steganography
1 Introduction
2 Literature Review
2.1 Introduction to Digital Forensics, Anti-forensics and Current Challenges
2.2 Anti-forensics—Data Hiding
2.3 Steganography Techniques
3 Results and Discussion
3.1 Limitation Od Study and Future Work
4 Conclusion
References
Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
1 Introduction
1.1 Synopsis on Cybersecurity Breaches
1.2 Human Factors Relative to the Occurrences of Cybersecurity Breach
1.3 Cyber-Security Concern in Health Records
2 Methodology
2.1 Research Design
2.2 Data Collection
2.3 Data Analysis
3 Datasets
4 Evaluation/Analysis
4.1 Malicious Versus Accidental Attacks
4.2 Impact Versus Frequency
4.3 Trends on States
5 Effect on the Business Industry
6 Effect on the Healthcare Industry
7 Recommendations/Preventative Measures
8 Results
9 Discussion/Conclusion
9.1 Data Breach Trends in Businesses
Appendix 1: Impact of Individuals by State
References
Identifying Daesh-Related Propaganda Using OSINT and Clustering Analysis
1 Introduction
2 Strategic Instability in the Digital Domain
2.1 Social Network Warfare
3 Jihadist Cyber and Cognitive Warfare
4 Jihadist Operations in the Cyberspace
4.1 Cyber-Training
4.2 Cyber-Planning and Cyber-Execution
4.3 Financing and Fundraising
4.4 Recruiting New Members
4.5 Online Propaganda
5 A Brief Introduction to Online Counterterrorism
5.1 Identifying Daesh-Related Propaganda with OSINT Tools
5.2 Predictive Analytics and Online Propaganda
6 Methodologies and Tools of Research
6.1 Aim of Our Study
6.2 Research Objectives
6.3 Justification
6.4 Systematic Literature Review
6.5 Literature Review
6.6 Research Phases [51]
6.7 Research Scope and Limitations
7 Conclusions
References
Cyberbullying Detection in Twitter Using Deep Learning Model Techniques
1 Introduction
2 Cyberbullying and Its Impact
3 Neural Network
3.1 Neural Network Algorithm to Detect Cyberbullying
3.2 Naïve Bayes-Based Algorithm to Perform Content-Based Analysis
3.3 Content-Based Analysis Using Icons and Hieroglyphs
3.4 Decision Tree Algorithms to Detect Harmful Words
4 Research Methods
4.1 DEA-RNN Model
4.2 RNN
5 Data Analysis and Critical Discussion
5.1 Data Gathering
5.2 Data Annotation
5.3 Data Pre-processing
5.4 Feature Extraction and Selection
5.5 Data Analysis
6 Conclusion and Future Work
References
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms
1 Introduction
2 Literature Review
2.1 Signature-Then-Encryption
2.2 Signcryption
2.3 El-Gamal-Based Signcryption
3 Proposed Scheme
3.1 Proposed Scheme Analysis
4 Results Achieved
4.1 Efficiency
4.2 Security Attributes of Proposed Scheme
5 Conclusion
References
ChildSecurity: A Web-Based Game to Raise Awareness of Cybersecurity and Privacy in Children
1 Introduction
2 Literature Review
3 Survey Analysis and Design Specification
4 Conceptual Framework
4.1 Attention
4.2 Relevance
4.3 Confidence
4.4 Satisfaction
5 ChildSecurity Implementation
5.1 Skill Tree
5.2 Malicious Links
5.3 Cyberbullying
5.4 Sensitive Information
5.5 Password Security
5.6 Evaluation
6 Conclusion
References
Subverting Biometric Security Using 3D Printed Biometrics Characteristics
1 Introduction
2 Background
2.1 Biometrics
2.2 3D Printing
3 Experimental Setup
3.1 Experimental Setup
4 Findings and Results
5 Conclusion and Future Research
References
Image Band-Distributive PCA Based Face Recognition Technique
1 Introduction
1.1 PCA for Face Recognition
1.2 Eigen Faces
2 Proposed Technique
2.1 Pre-Processing
2.2 Multi-image Generation
2.3 Principal Component Analysis
2.4 Matching
3 Experiments and Results
3.1 Database
3.2 Methodology
3.3 Experimental Results and Observations
4 Conclusion
References
RAFA Model. Rethinking Cyber Risk Management in Organizations
1 Introduction
2 The BANI World-Brittle, Anxious, Non-linear and Incomprehensible
3 Cyber Risk. A Systemic Risk
4 The False Sense of Security. The Comfort Zone of Standards and Best Practices
5 RAFA Model. Rethinking Cyber Risk Management
6 Conclusions
References
AI and Ethics: Embedding Good Aspects of AI
1 Introduction
2 Ethics and AI
3 Developing Trustworthy AI
4 AI is Good for Society!
5 Box–Jenkins Model—Safe AI
6 Implications
7 Conclusion
References
Cyber Security-Related Awareness in Bangladesh: Relevant Challenges and Strategies
1 Introduction
2 Problem Statement
3 Literature Review
4 Methodology
5 Cyber Security in the Global Village
6 Challenges to Bangladesh and Bangladesh Government
7 Recommendations to Raise Cybersucurity Awareness in Bangladesh
8 Conclusion
References
Credit Card Fraud Detection Using Machine Learning
1 Introduction
2 Artificial Intelligence
2.1 Machine Learning
2.2 Logistic Regression
2.3 Decision Tree
2.4 Random Forest
2.5 XGBoost
3 Related Works
4 Research Methods
4.1 Google Colaboratory
4.2 Proposed Approach
4.3 Data Analysis
4.4 Data Standardisation
4.5 Handling Missing Value
4.6 Splitting the Data
4.7 Sampling Data
5 Model Creation
5.1 Hyper Parameter Tuning in Logistic Regression
5.2 Hyper Parameter Tuning in Decision Tree Classifier
5.3 Hyperparameter Tuning in XGBoost
5.4 Hyper Parameter Tuning in Random Forest
6 Model Evaluation
6.1 Confusion Matrix
7 Analysis
7.1 Data Analysis
7.2 Model Evaluation
8 Conclusions and Future Work
References
The Role of Trust and Ethics in IT Administration and Its Impact on an Organisation
1 Introduction
2 Literature Review
2.1 The Importance of IT Administration in the Information Age
2.2 Trust
2.3 Ethics
3 Research Gaps
4 Methodology
4.1 In-Depth Interviews and Recruitment
5 Method of Analysis
6 Results and Analysis
6.1 Profile
6.2 Solution Implementation
6.3 Trust
7 Discussion and Future Recommendations
8 Limitations and Future Research
9 Conclusion
References
How Explainable Artificial Intelligence (XAI) Models Can Be Used Within Intrusion Detection Systems (IDS) to Enhance an Analyst's Trust and Understanding
1 Introduction
1.1 Background
2 Related Work
2.1 AI Technologies
2.2 Measuring Trust in AI Technologies
2.3 AI-Embedded Intrusion Detection Systems (IDS)
2.4 Explainable AI (XAI)
2.5 Using XAI Models Within IDSs
3 Research Methodology and Design of Practical Work
3.1 Methodology
3.2 Design of Practical Work
4 Data Analysis and Evaluation
5 Key Findings and Recommendations
5.1 Key Findings
5.2 Recommendations
6 Conclusions and Future Developments
6.1 Conclusion
6.2 Future Developments
6.3 Ethical Conclusions
References
Could Adam Smith Live in a Smart City?
1 Introduction
2 Neuroscience: Are We Capable of Acting in Our Own Best Interests?
3 Moral Frameworks
4 Big Data Versus the Individual
5 The Information Economy: Trust Versus Transparency
6 Smart Cities: The Conclusion?
References
An Analysis of Blockchain Adoption in Zimbabwean Mining Land Title Management (MLTM) Using NVivo
1 Introduction
2 New Institutionalism (NI), Actor Network Theory (ANT) and Implications for Governance
3 Digital Transformation of Mining Title Management in Zimbabwe: The Cadastre System
3.1 The Cadastre System or Concept
3.2 Implementation of the Computerised Mining Cadastre System: Lessons Learned from Implementing African Countries
3.3 Deployment of the Cadastre System in Zimbabwe
4 Blockchain Technology and Its Implications for Land Title Management
4.1 Blockchain in Cadastre
4.2 Peculiar Features of the Land Mining Sector and the Applicability of Blockchain-SSI Technology to Mining Title Management: Adaptation or Adoption?
4.3 Qualitative Analysis of Data on Mining Disputes
4.4 Qualitative Data Organisation Technique
5 Conclusion
References
Cybersecurity at the Core: A Study on IT Experts’ Policy Adherence
1 Introduction
2 Background and Motivations
3 Research Methodology
4 Results and Discussion
5 Conclusion
References
Metaverse Application Forensics: Unravelling the Virtual Truth
1 Introduction
2 Methodology
3 Experimental Findings
3.1 Results of RAM Analysis
3.2 Results of HDD Analysis
4 Conclusions
References
Cloud-Based Secure Electronic Medical Data Sharing System Using Blockchain Technology (Simulation of a Ransomware Attack with OWASP)
1 Introduction
2 Literature Review
3 Electronic Medical Data Sharing System Using Blockchain
4 Ransomware Attack Mitigation Using Blockchain
5 Research Methods
5.1 Conventional Software Architecture Versus Proposed Software Architecture
5.2 Algorithm
5.3 System Implementation/Design
5.4 Doctor’s Registration Page
6 Critical Discussion
7 Conclusion
References