Claim Missing Document
Check
Articles

Found 2 Documents
Search

System call frequency analysis-based generative adversarial network model for zero-day detection on mobile devices Chhaybi, Akram; Lazaar, Saiida
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i2.pp1969-1978

Abstract

In today's digital age, mobile applications have become essential in connecting people from diverse domains. They play a crucial role in enabling communication, facilitating business transactions, and providing access to a range of services. Mobile communication is widespread due to its portability and ease of use, with an increasing number of mobile devices projected to reach 18.22 billion by the end of 2025. However, this convenience comes at a cost, as cybercriminals are constantly looking for ways to exploit security vulnerabilities in mobile applications. Among the several varieties of malicious applications, zero-day malware is particularly dangerous since it cannot be removed by antivirus software. To detect zero-day Android malware, this paper introduces a novel approach based on generative adversarial networks (GANs), which generates new frequencies of feature vectors from system calls. In the proposed approach, the generator is fed with a mixture of real samples and noise, and then trained to create new samples, while the discriminator model aims to classify these samples as either real or fake. We assess the performance of our model through different measures, including loss functions, the Frechet Inception distance, and the inception score evaluation metrics.
Fortifying industrial cybersecurity: a novel industrial internet of things architecture enhanced by honeypot integration Kouari, Oumaima El; Lazaar, Saiida; Achoughi, Tarik
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i1.pp1089-1098

Abstract

The industrial internet of things (IIoT) has significantly transformed the industrial sectors by connecting devices, machines, and systems to enhance automation, efficiency, and decision-making. However, the increased interconnectivity also poses significant security challenges because IIoT devices control critical infrastructures and processes. Our work presents an implementation of a robust industrial cybersecurity strategy with a segmented network architecture, collaborative efforts between information technology (IT) and operational technology (OT) teams for enhanced resilience and effectiveness, and vertical honeypots across all Industry 4.0 levels integrated with Wazuh for log transmission and proactive threat response, alongside Snort intrusion detection system (IDS) monitoring network traffic. Additionally, we reinforce our architecture by Wazuh with Elasticsearch and Kibana as a security information and event management solution, facilitating data analysis and compliance enforcement through custom rulesets and cybersecurity threat intelligence (CTI) integration, with automatic updates for continuous adaptation against emerging threats.