Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 9783031475948, 9783031475931

This book provides an opportunity for researchers, scientists, government officials, strategist and operators and mainta

115 69 41MB

English Year 2024

Report DMCA / Copyright

DOWNLOAD FILE

Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023
 9783031475948, 9783031475931

Table of contents :
Committee
About the Conference
Contents
Strengthening Security Mechanisms of Satellites and UAVs Against Possible Attacks from Quantum Computers
1 Introduction
2 Literature Review
2.1 Quantum Key Distribution (QKD)
2.2 Post Quantum Network Security Layer
3 QKD for Satellites, Drones and UAVs
3.1 Difficulties in Implementing QKD Protocols
3.2 Existing QKD Protocols
4 The Osslayer Protocol Implementation
5 Conclusions
References
Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles
1 Introduction
2 Literature Review and Background Research
2.1 Components of UAS
2.2 Background Research Focused on UAV Operating Systems
2.3 Background on RTOS and ROS
2.4 Literature Review for RTOS and ROS
3 Experiment Methodology
3.1 Comparing Multiple Approaches on Evaluating Security of the Linux Operating Systems
4 Results
4.1 Vulnerability Scanning
4.2 Auditing
4.3 Potential Privilege Escalation Vectors
5 Validation of the Results
5.1 Vulnerability Scanning
5.2 Auditing the System
5.3 Privilege Escalation
6 Discussion and Conclusions
6.1 Limitations of the Study
6.2 Further Work
References
A Proposed Permissioned Blockchain Consensus Algorithm: Consensus Algorithm Genetically Enhanced (CAGE)
1 Introduction
1.1 Ethics and Sustainability
2 Blockchain Anatomy
3 Genetic Algorithms
4 Cage
4.1 Differences Between PoET and CAGE
5 Method
6 Results and Analysis
6.1 Transactions
6.2 Block Latency
6.3 Node Distribution
7 Conclusion
7.1 Future Work
7.2 Discussion
8 Summary
References
Data Hiding in Anti-forensics—Exploit Delivery Through Digital Steganography
1 Introduction
2 Literature Review
2.1 Introduction to Digital Forensics, Anti-forensics and Current Challenges
2.2 Anti-forensics—Data Hiding
2.3 Steganography Techniques
3 Results and Discussion
3.1 Limitation Od Study and Future Work
4 Conclusion
References
Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
1 Introduction
1.1 Synopsis on Cybersecurity Breaches
1.2 Human Factors Relative to the Occurrences of Cybersecurity Breach
1.3 Cyber-Security Concern in Health Records
2 Methodology
2.1 Research Design
2.2 Data Collection
2.3 Data Analysis
3 Datasets
4 Evaluation/Analysis
4.1 Malicious Versus Accidental Attacks
4.2 Impact Versus Frequency
4.3 Trends on States
5 Effect on the Business Industry
6 Effect on the Healthcare Industry
7 Recommendations/Preventative Measures
8 Results
9 Discussion/Conclusion
9.1 Data Breach Trends in Businesses
Appendix 1: Impact of Individuals by State
References
Identifying Daesh-Related Propaganda Using OSINT and Clustering Analysis
1 Introduction
2 Strategic Instability in the Digital Domain
2.1 Social Network Warfare
3 Jihadist Cyber and Cognitive Warfare
4 Jihadist Operations in the Cyberspace
4.1 Cyber-Training
4.2 Cyber-Planning and Cyber-Execution
4.3 Financing and Fundraising
4.4 Recruiting New Members
4.5 Online Propaganda
5 A Brief Introduction to Online Counterterrorism
5.1 Identifying Daesh-Related Propaganda with OSINT Tools
5.2 Predictive Analytics and Online Propaganda
6 Methodologies and Tools of Research
6.1 Aim of Our Study
6.2 Research Objectives
6.3 Justification
6.4 Systematic Literature Review
6.5 Literature Review
6.6 Research Phases [51]
6.7 Research Scope and Limitations
7 Conclusions
References
Cyberbullying Detection in Twitter Using Deep Learning Model Techniques
1 Introduction
2 Cyberbullying and Its Impact
3 Neural Network
3.1 Neural Network Algorithm to Detect Cyberbullying
3.2 Naïve Bayes-Based Algorithm to Perform Content-Based Analysis
3.3 Content-Based Analysis Using Icons and Hieroglyphs
3.4 Decision Tree Algorithms to Detect Harmful Words
4 Research Methods
4.1 DEA-RNN Model
4.2 RNN
5 Data Analysis and Critical Discussion
5.1 Data Gathering
5.2 Data Annotation
5.3 Data Pre-processing
5.4 Feature Extraction and Selection
5.5 Data Analysis
6 Conclusion and Future Work
References
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms
1 Introduction
2 Literature Review
2.1 Signature-Then-Encryption
2.2 Signcryption
2.3 El-Gamal-Based Signcryption
3 Proposed Scheme
3.1 Proposed Scheme Analysis
4 Results Achieved
4.1 Efficiency
4.2 Security Attributes of Proposed Scheme
5 Conclusion
References
ChildSecurity: A Web-Based Game to Raise Awareness of Cybersecurity and Privacy in Children
1 Introduction
2 Literature Review
3 Survey Analysis and Design Specification
4 Conceptual Framework
4.1 Attention
4.2 Relevance
4.3 Confidence
4.4 Satisfaction
5 ChildSecurity Implementation
5.1 Skill Tree
5.2 Malicious Links
5.3 Cyberbullying
5.4 Sensitive Information
5.5 Password Security
5.6 Evaluation
6 Conclusion
References
Subverting Biometric Security Using 3D Printed Biometrics Characteristics
1 Introduction
2 Background
2.1 Biometrics
2.2 3D Printing
3 Experimental Setup
3.1 Experimental Setup
4 Findings and Results
5 Conclusion and Future Research
References
Image Band-Distributive PCA Based Face Recognition Technique
1 Introduction
1.1 PCA for Face Recognition
1.2 Eigen Faces
2 Proposed Technique
2.1 Pre-Processing
2.2 Multi-image Generation
2.3 Principal Component Analysis
2.4 Matching
3 Experiments and Results
3.1 Database
3.2 Methodology
3.3 Experimental Results and Observations
4 Conclusion
References
RAFA Model. Rethinking Cyber Risk Management in Organizations
1 Introduction
2 The BANI World-Brittle, Anxious, Non-linear and Incomprehensible
3 Cyber Risk. A Systemic Risk
4 The False Sense of Security. The Comfort Zone of Standards and Best Practices
5 RAFA Model. Rethinking Cyber Risk Management
6 Conclusions
References
AI and Ethics: Embedding Good Aspects of AI
1 Introduction
2 Ethics and AI
3 Developing Trustworthy AI
4 AI is Good for Society!
5 Box–Jenkins Model—Safe AI
6 Implications
7 Conclusion
References
Cyber Security-Related Awareness in Bangladesh: Relevant Challenges and Strategies
1 Introduction
2 Problem Statement
3 Literature Review
4 Methodology
5 Cyber Security in the Global Village
6 Challenges to Bangladesh and Bangladesh Government
7 Recommendations to Raise Cybersucurity Awareness in Bangladesh
8 Conclusion
References
Credit Card Fraud Detection Using Machine Learning
1 Introduction
2 Artificial Intelligence
2.1 Machine Learning
2.2 Logistic Regression
2.3 Decision Tree
2.4 Random Forest
2.5 XGBoost
3 Related Works
4 Research Methods
4.1 Google Colaboratory
4.2 Proposed Approach
4.3 Data Analysis
4.4 Data Standardisation
4.5 Handling Missing Value
4.6 Splitting the Data
4.7 Sampling Data
5 Model Creation
5.1 Hyper Parameter Tuning in Logistic Regression
5.2 Hyper Parameter Tuning in Decision Tree Classifier
5.3 Hyperparameter Tuning in XGBoost
5.4 Hyper Parameter Tuning in Random Forest
6 Model Evaluation
6.1 Confusion Matrix
7 Analysis
7.1 Data Analysis
7.2 Model Evaluation
8 Conclusions and Future Work
References
The Role of Trust and Ethics in IT Administration and Its Impact on an Organisation
1 Introduction
2 Literature Review
2.1 The Importance of IT Administration in the Information Age
2.2 Trust
2.3 Ethics
3 Research Gaps
4 Methodology
4.1 In-Depth Interviews and Recruitment
5 Method of Analysis
6 Results and Analysis
6.1 Profile
6.2 Solution Implementation
6.3 Trust
7 Discussion and Future Recommendations
8 Limitations and Future Research
9 Conclusion
References
How Explainable Artificial Intelligence (XAI) Models Can Be Used Within Intrusion Detection Systems (IDS) to Enhance an Analyst's Trust and Understanding
1 Introduction
1.1 Background
2 Related Work
2.1 AI Technologies
2.2 Measuring Trust in AI Technologies
2.3 AI-Embedded Intrusion Detection Systems (IDS)
2.4 Explainable AI (XAI)
2.5 Using XAI Models Within IDSs
3 Research Methodology and Design of Practical Work
3.1 Methodology
3.2 Design of Practical Work
4 Data Analysis and Evaluation
5 Key Findings and Recommendations
5.1 Key Findings
5.2 Recommendations
6 Conclusions and Future Developments
6.1 Conclusion
6.2 Future Developments
6.3 Ethical Conclusions
References
Could Adam Smith Live in a Smart City?
1 Introduction
2 Neuroscience: Are We Capable of Acting in Our Own Best Interests?
3 Moral Frameworks
4 Big Data Versus the Individual
5 The Information Economy: Trust Versus Transparency
6 Smart Cities: The Conclusion?
References
An Analysis of Blockchain Adoption in Zimbabwean Mining Land Title Management (MLTM) Using NVivo
1 Introduction
2 New Institutionalism (NI), Actor Network Theory (ANT) and Implications for Governance
3 Digital Transformation of Mining Title Management in Zimbabwe: The Cadastre System
3.1 The Cadastre System or Concept
3.2 Implementation of the Computerised Mining Cadastre System: Lessons Learned from Implementing African Countries
3.3 Deployment of the Cadastre System in Zimbabwe
4 Blockchain Technology and Its Implications for Land Title Management
4.1 Blockchain in Cadastre
4.2 Peculiar Features of the Land Mining Sector and the Applicability of Blockchain-SSI Technology to Mining Title Management: Adaptation or Adoption?
4.3 Qualitative Analysis of Data on Mining Disputes
4.4 Qualitative Data Organisation Technique
5 Conclusion
References
Cybersecurity at the Core: A Study on IT Experts’ Policy Adherence
1 Introduction
2 Background and Motivations
3 Research Methodology
4 Results and Discussion
5 Conclusion
References
Metaverse Application Forensics: Unravelling the Virtual Truth
1 Introduction
2 Methodology
3 Experimental Findings
3.1 Results of RAM Analysis
3.2 Results of HDD Analysis
4 Conclusions
References
Cloud-Based Secure Electronic Medical Data Sharing System Using Blockchain Technology (Simulation of a Ransomware Attack with OWASP)
1 Introduction
2 Literature Review
3 Electronic Medical Data Sharing System Using Blockchain
4 Ransomware Attack Mitigation Using Blockchain
5 Research Methods
5.1 Conventional Software Architecture Versus Proposed Software Architecture
5.2 Algorithm
5.3 System Implementation/Design
5.4 Doctor’s Registration Page
6 Critical Discussion
7 Conclusion
References

Polecaj historie