Change search
Link to record
Permanent link

Direct link
Publications (7 of 7) Show all publications
Eklund, D., Iacovazzi, A., Wang, H., Pyrgelis, A. & Raza, S. (2024). BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection. Paper presented at 29th European Symposium on Research in Computer Security, ESORICS 2024. Bydgoszcz. 16 September 2024 through 20 September 2024. Lecture Notes in Computer Science, 14983 LNCS, 353-373
Open this publication in new window or tab >>BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection
Show others...
2024 (English)In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 14983 LNCS, p. 353-373Article in journal (Refereed) Published
Abstract [en]

We introduce low complexity bounds on mutual information for efficient privacy-preserving feature selection with secure multi-party computation (MPC). Considering a discrete feature with N possible values and a discrete label with M possible values, our approach requires O(N) multiplications as opposed to O(NM) in a direct MPC implementation of mutual information. Our experimental results show that for regression tasks, we achieve a computation speed up of over 1,000× compared to a straightforward MPC implementation of mutual information, while achieving similar accuracy for the downstream machine learning model.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
Keywords
Differential privacy; Complexity bounds; Computation speed; Features selection; Lower complexity; Multiparty computation; Mutual informations; Privacy; Privacy preserving; Secure multi-party computation; Speed up
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-76193 (URN)10.1007/978-3-031-70890-9_18 (DOI)2-s2.0-85204610017 (Scopus ID)
Conference
29th European Symposium on Research in Computer Security, ESORICS 2024. Bydgoszcz. 16 September 2024 through 20 September 2024
Note

This research is funded by the EU Horizon Europe project HARPOCRATES (Grant ID. 101069535) and H2020 project CONCORDIA (Grant ID. 830927). We thank Tuomas Karhu for preparing the SpO2 data as well as help and advice in the process. We would also like to thank the anonymous reviewers for their comments and suggested improvements.

Available from: 2024-11-18 Created: 2024-11-18 Last updated: 2024-11-18Bibliographically approved
Wang, H., Iacovazzi, A., Kim, S. & Raza, S. (2024). CLEVER: Crafting Intelligent MISP for Cyber Threat Intelligence. In: Proceedings - Conference on Local Computer Networks, LCN: . Paper presented at 49th IEEE Conference on Local Computer Networks, LCN 2024. Caen. 8 October 2024 through 10 October 2024. IEEE Computer Society
Open this publication in new window or tab >>CLEVER: Crafting Intelligent MISP for Cyber Threat Intelligence
2024 (English)In: Proceedings - Conference on Local Computer Networks, LCN, IEEE Computer Society , 2024Conference paper, Published paper (Refereed)
Abstract [en]

Cyber Threat Intelligence (CTI) is crucial for modern cybersecurity because it provides the knowledge and insights needed to defend against a wide range of cyber threats. However, there are issues associated with incomplete and inconsistent CTI data that can lead to inaccurate threat assessments, increasing the risk of both false alarms and undetected threats. This paper introduces CLEVER, an extended version of the Malware Information Sharing Platform (MISP) platform that includes machine learning (ML) models to support the management and processing of CTI data. The models are designed to address specific challenges such as (i) prioritizing and ranking Indicators of Compromise (IoCs) based on severity and potential impact, (ii) classifying IoCs by attack type or threat, and (iii) aggregating similar IoCs into clusters. The effectiveness of the ML models employed in CLEVER has been thoroughly tested on three public CTI datasets, and the results provide encouraging outcomes in enhancing CTI management and analysis. 

Place, publisher, year, edition, pages
IEEE Computer Society, 2024
Keywords
Adversarial machine learning; Phishing; Cyber security; Cyber threats; Extended versions; Falsealarms; Information sharing platforms; Intelligence analysis; Machine learning models; Malwares; Potential impacts; Threat assessment; Cyber attacks
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-76472 (URN)10.1109/LCN60385.2024.10639749 (DOI)2-s2.0-85214936871 (Scopus ID)
Conference
49th IEEE Conference on Local Computer Networks, LCN 2024. Caen. 8 October 2024 through 10 October 2024
Available from: 2025-01-28 Created: 2025-01-28 Last updated: 2025-01-28Bibliographically approved
Karlsson, A., Hoglund, R., Wang, H., Iacovazzi, A. & Raza, S. (2024). Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT. In: : . Paper presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 82-89). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT
Show others...
2024 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Cyber Threat Intelligence (CTI) development has largely overlooked the IoT- network-connected devices like sensors. These devices’ heterogeneity, poor security, and memory and energy constraints make them prime cyber attack targets. Enhancing CTI for IoT is crucial. Currently, CTI for IoT is derived from honeypots mimicking IoT devices or extrapolated from standard computing systems. These methods are not ideal for resource-constrained devices. This study addresses this gap by introducing tinySTIX and tinyTAXII. TinySTIX is a data format designed for efficient sharing of CTI directly from resource-constrained devices. TinyTAXII is a lightweight implementation of the TAXII protocol, utilizing CoAP with OSCORE. Two implementations were assessed: one for integration into the MISP platform and the other for execution on network-connected devices running the Contiki operating system. Results demonstrated that tinySTIX reduces message size by an average of 35%, while tinyTAXII reduces packet count and session size by 85% compared to reference OpenTAXII implementations. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2024
Keywords
Cyber threat intelligence; Cyber threats; Device heterogeneities; Indicator of compromize; Intelligence sharing; Inter-net of thing; MISP; Resourceconstrained devices; STIX; TAXII; Cyber attacks
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-76025 (URN)10.1109/CSR61664.2024.10679511 (DOI)2-s2.0-85206142400 (Scopus ID)9798350375367 (ISBN)
Conference
2024 IEEE International Conference on Cyber Security and Resilience (CSR)
Funder
Swedish Foundation for Strategic Research, aSSIsTEU, Horizon 2020, 830927
Note

This work was supported in part by the Swedish Foundation for Strategic Research (SSF) project aSSIsT, and in part by the H2020 project CONCORDIA (Grant agreement 830927).

Available from: 2024-11-01 Created: 2024-11-01 Last updated: 2024-11-01Bibliographically approved
Zenden, I., Wang, H., Iacovazzi, A., Vahidi, A., Blom, R. & Raza, S. (2023). On the Resilience of Machine Learning-Based IDS for Automotive Networks. In: proc of IEEE Vehicular Networking Conference, VNC: . Paper presented at 14th IEEE Vehicular Networking Conference, VNC 2023.Instanbul. 26 April 2023 through 28 April 2023. (pp. 239-246). IEEE Computer Society
Open this publication in new window or tab >>On the Resilience of Machine Learning-Based IDS for Automotive Networks
Show others...
2023 (English)In: proc of IEEE Vehicular Networking Conference, VNC, IEEE Computer Society , 2023, p. 239-246Conference paper, Published paper (Refereed)
Abstract [en]

Modern automotive functions are controlled by a large number of small computers called electronic control units (ECUs). These functions span from safety-critical autonomous driving to comfort and infotainment. ECUs communicate with one another over multiple internal networks using different technologies. Some, such as Controller Area Network (CAN), are very simple and provide minimal or no security services. Machine learning techniques can be used to detect anomalous activities in such networks. However, it is necessary that these machine learning techniques are not prone to adversarial attacks. In this paper, we investigate adversarial sample vulnerabilities in four different machine learning-based intrusion detection systems for automotive networks. We show that adversarial samples negatively impact three of the four studied solutions. Furthermore, we analyze transferability of adversarial samples between different systems. We also investigate detection performance and the attack success rate after using adversarial samples in the training. After analyzing these results, we discuss whether current solutions are mature enough for a use in modern vehicles.

Place, publisher, year, edition, pages
IEEE Computer Society, 2023
Keywords
Adversarial AI/ML, Controller Area Network, Intrusion Detection System, Machine Learning, Vehicle Security, Computer crime, Control system synthesis, Controllers, Intrusion detection, Learning algorithms, Network security, Process control, Safety engineering, Automotive networks, Automotives, Autonomous driving, Controller-area network, Electronics control unit, Intrusion Detection Systems, Machine learning techniques, Machine-learning
National Category
Control Engineering
Identifiers
urn:nbn:se:ri:diva-65727 (URN)10.1109/VNC57357.2023.10136285 (DOI)2-s2.0-85163164299 (Scopus ID)9798350335491 (ISBN)
Conference
14th IEEE Vehicular Networking Conference, VNC 2023.Instanbul. 26 April 2023 through 28 April 2023.
Note

This research is partially funded by the CyReV project(Sweden’s Innovation Agency, D-nr 2019-03071), partiallyby the H2020 ARCADIAN-IoT (Grant ID. 101020259), andH2020 VEDLIoT (Grant ID. 957197).

Available from: 2023-08-11 Created: 2023-08-11 Last updated: 2024-03-03Bibliographically approved
Iacovazzi, A., Wang, H., Butun, I. & Raza, S. (2023). Towards Cyber Threat Intelligence for the IoT. In: Proceedings - 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023: . Paper presented at 19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023. Pafos. 19 June 2023 through 21 June 2023 (pp. 483-490). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Towards Cyber Threat Intelligence for the IoT
2023 (English)In: Proceedings - 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023, Institute of Electrical and Electronics Engineers Inc. , 2023, p. 483-490Conference paper, Published paper (Refereed)
Abstract [en]

With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization’s threat mitigation strategy. This Cyber Threat Intelligence (CTI) is becoming increasingly important, or rather necessary, for critical national and industrial infrastructures. Current CTI solutions are rather federated and unsuitable for sharing threat information from low-power IoT devices. This paper presents a taxonomy and analysis of the CTI frameworks and CTI exchange platforms available today. It proposes a new CTI architecture relying on the MISP Threat Intelligence Sharing Platform customized and focusing on IoT environment. The paper also introduces a tailored version of STIX (which we call tinySTIX), one of the most prominent standards adopted for CTI data modeling, optimized for low-power IoT devices using the new lightweight encoding and cryptography solutions. The proposed CTI architecture will be very beneficial for securing IoT networks, especially the ones working in harsh and adversarial environments. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
Internet of things; Cybe threat intelligence; Cyber threats; Digitisation; Indicator of compromize; Low Power; MISP; Mitigation strategy; National infrastructure; STIX; Threats mitigations; Network architecture
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-67676 (URN)10.1109/DCOSS-IoT58021.2023.00081 (DOI)2-s2.0-85174417452 (Scopus ID)
Conference
19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023. Pafos. 19 June 2023 through 21 June 2023
Note

This work has been supported by the H2020 projectARCADIAN-IoT (https://www.arcadian-iot.eu/) [G.A. No.101020259] 

Available from: 2023-11-14 Created: 2023-11-14 Last updated: 2023-11-14Bibliographically approved
Figueiredo, S., Silva, P., Iacovazzi, A., Holubenko, V., Casal, J., Calero, J. M., . . . Raza, S. (2022). ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT. In: Lect. Notes Comput. Sci. 5th The Global IoT Summit, GIoTS 2022. Dublin 20 June 2022 through 23 June 2022: . Paper presented at 5th The Global IoT Summit, GIoTS 2022. Dublin 20 June 2022 through 23 June 2022 (pp. 348-359). Springer Science and Business Media Deutschland GmbH, 13533
Open this publication in new window or tab >>ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT
Show others...
2022 (English)In: Lect. Notes Comput. Sci. 5th The Global IoT Summit, GIoTS 2022. Dublin 20 June 2022 through 23 June 2022, Springer Science and Business Media Deutschland GmbH , 2022, Vol. 13533, p. 348-359Conference paper, Published paper (Refereed)
Abstract [en]

Cybersecurity incidents have been growing both in number and associated impact, as a result from society’s increased dependency in information and communication technologies - accelerated by the recent pandemic. In particular, IoT. technologies, which enable significant flexibility and cost-efficiency, but are also associated to more relaxed security mechanisms, have been quickly adopted across all sectors of the society, including critical infrastructures (e.g. smart grids) and services (e.g. eHealth). Gaps such as high dependence on 3rd party IT suppliers and device manufacturers increase the importance of trustworthy and secure solutions for future digital services. This paper presents ARCADIAN-IoT, a framework aimed at holistically enabling trust, security, privacy and recovery in IoT systems, and enabling a Chain of Trust between the different IoT entities (persons, objects and services). It builds on features such as federated AI for effective and privacy-preserving cybersecurity, distributed ledger technologies for decentralized management of trust, or transparent, user-controllable and decentralized privacy. © 2022, The Author(s)

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2022
Keywords
ARCADIAN-IoT, Cybersecurity, IoT, Trust, Distributed ledger, Internet of things, Privacy-preserving techniques, Cost-efficiency, Cyber security, Information and Communication Technologies, Privacy management, Security and privacy, Security management, Trust management
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-64111 (URN)10.1007/978-3-031-20936-9_28 (DOI)2-s2.0-85147849817 (Scopus ID)9783031209352 (ISBN)
Conference
5th The Global IoT Summit, GIoTS 2022. Dublin 20 June 2022 through 23 June 2022
Available from: 2023-02-28 Created: 2023-02-28 Last updated: 2023-06-08Bibliographically approved
Iacovazzi, A. & Raza, S. (2022). Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers. In: Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022: . Paper presented at 2nd IEEE International Conference on Cyber Security and Resilience, CSR 2022, 27 July 2022 through 29 July 2022 (pp. 30-37). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers
2022 (English)In: Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022, Institute of Electrical and Electronics Engineers Inc. , 2022, p. 30-37Conference paper, Published paper (Refereed)
Abstract [en]

We propose a novel solution combining supervised and unsupervised machine learning models for intrusion detection at kernel level in cloud containers. In particular, the proposed solution is built over an ensemble of random and isolation forests trained on sequences of system calls that are collected at the hosting machine's kernel level. The sequence of system calls are translated into a weighted and directed graph to obtain a compact description of the container behavior, which is given as input to the ensemble model. We executed a set of experiments in a controlled environment in order to test our solution against the two most common threats that have been identified in cloud containers, and our results show that we can achieve high detection rates and low false positives in the tested attacks. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2022
Keywords
Cloud containers, Intrusion Detection System, Machine learning on Graph, Directed graphs, Forestry, Graphic methods, Intrusion detection, Machine learning, Cloud container, Graph-based, Intrusion Detection Systems, Intrusion-Detection, Machine-learning, Novel solutions, Supervised machine learning, System calls, Unsupervised machine learning, Containers
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-60157 (URN)10.1109/CSR54599.2022.9850307 (DOI)2-s2.0-85137367814 (Scopus ID)9781665499521 (ISBN)
Conference
2nd IEEE International Conference on Cyber Security and Resilience, CSR 2022, 27 July 2022 through 29 July 2022
Note

 Funding text 1: This research is partially funded by the EU H2020 ARCADIAN-IoT (Grant ID. 101020259) and partly by the H2020 CONCORDIA (Grant ID. 830927).

Available from: 2022-10-10 Created: 2022-10-10 Last updated: 2023-06-08Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6116-164X

Search in DiVA

Show all publications