(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–18 of 18 results for author: Shaghaghi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.19662  [pdf, other

    cs.CR

    Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification

    Authors: Uzma Maroof, Gustavo Batista, Arash Shaghaghi, Sanjay Jha

    Abstract: Internet of Things (IoT) devices have grown in popularity since they can directly interact with the real world. Home automation systems automate these interactions. IoT events are crucial to these systems' decision-making but are often unreliable. Security vulnerabilities allow attackers to impersonate events. Using statistical machine learning, IoT event fingerprints from deployed sensors have be… ▽ More

    Submitted 28 July, 2024; originally announced July 2024.

    Comments: Accepted - 49th IEEE Conference on Local Computer Networks (LCN)

  2. arXiv:2407.14116  [pdf, other

    cs.CR cs.LG

    AuditNet: A Conversational AI-based Security Assistant [DEMO]

    Authors: Shohreh Deldari, Mohammad Goudarzi, Aditya Joshi, Arash Shaghaghi, Simon Finn, Flora D. Salim, Sanjay Jha

    Abstract: In the age of information overload, professionals across various fields face the challenge of navigating vast amounts of documentation and ever-evolving standards. Ensuring compliance with standards, regulations, and contractual obligations is a critical yet complex task across various professional fields. We propose a versatile conversational AI assistant framework designed to facilitate complian… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

  3. arXiv:2407.11207  [pdf, other

    cs.CY

    Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System

    Authors: Akanksha Saini, Arash Shaghaghi, Zhibo Huang, Salil S. Kanhere

    Abstract: The challenges of healthcare supply chain management systems during the COVID-19 pandemic highlighted the need for an innovative and robust medical supply chain. The healthcare supply chain involves various stakeholders who must share information securely and actively. Regulatory and compliance reporting is also another crucial requirement for perishable products (e.g., pharmaceuticals) within a m… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: AIOT 2024 Conference (Accepted)

  4. arXiv:2407.05290  [pdf, ps, other

    cs.CR

    Lack of Systematic Approach to Security of IoT Context Sharing Platforms

    Authors: Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha

    Abstract: IoT context-sharing platforms are an essential component of today's interconnected IoT deployments with their security affecting the entire deployment and the critical infrastructure adopting IoT. We report on a lack of systematic approach to the security of IoT context-sharing platforms and propose the need for a methodological and systematic alternative to evaluate the existing solutions and dev… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

    Comments: Accepted to 21st Annual International Conference on Privacy, Security, and Trust (PST2024)

  5. arXiv:2407.01282  [pdf

    cs.CY cs.CR

    Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data

    Authors: Andrew Reeves, Arash Shaghaghi, Shiri Krebs, Debi Ashenden

    Abstract: The digital footprints of today's internet-active individuals are a testament to their lives, and have the potential to become digital legacies once they pass on. Future descendants of those alive today will greatly appreciate the unprecedented insight into the lives of their long since deceased ancestors, but this can only occur if today we have a process for data preservation and handover after… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: Accepted at 18th International Symposium on Human Aspects of Information Security and Assurance

  6. AI for Next Generation Computing: Emerging Trends and Future Directions

    Authors: Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani, Panos Patros, Rami Bahsoon, Arash Shaghaghi, Muhammed Golec, Vlado Stankovski, Huaming Wu, Ajith Abraham, Manmeet Singh, Harshit Mehta, Soumya K. Ghosh, Thar Baker, Ajith Kumar Parlikad, Hanan Lutfiyya, Salil S. Kanhere, Rizos Sakellariou, Schahram Dustdar, Omer Rana, Ivona Brandic, Steve Uhlig

    Abstract: Autonomic computing investigates how systems can achieve (user) specified control outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and inter-dependent control loops. Despite research into… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: Accepted for Publication in Elsevier IoT Journal, 2022

  7. arXiv:2111.11874  [pdf, other

    cs.CR cs.LG

    Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

    Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere

    Abstract: Security risk assessment and prediction are critical for organisations deploying Internet of Things (IoT) devices. An absolute minimum requirement for enterprises is to verify the security risk of IoT devices for the reported vulnerabilities in the National Vulnerability Database (NVD). This paper proposes a novel risk prediction for IoT devices based on publicly available information about them.… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: Accepted - EAI MobiQuitous 2021 - 18th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

  8. Proactive and AoI-aware Failure Recovery for Stateful NFV-enabled Zero-Touch 6G Networks: Model-Free DRL Approach

    Authors: Amirhossein Shaghaghi, Abolfazl Zakeri, Nader Mokari, Mohammad Reza Javan, Mohammad Behdadfar, Eduard A Jorswieck

    Abstract: In this paper, we propose a Zero-Touch, deep reinforcement learning (DRL)-based Proactive Failure Recovery framework called ZT-PFR for stateful network function virtualization (NFV)-enabled networks. To this end, we formulate a resource-efficient optimization problem minimizing the network cost function including resource cost and wrong decision penalty. As a solution, we propose state-of-the-art… ▽ More

    Submitted 11 September, 2021; v1 submitted 2 February, 2021; originally announced March 2021.

    Comments: Accepted by IEEE TNSM for publication Code is available in https://github.com/wildsky95/ZT-PFR

  9. arXiv:2010.12134  [pdf, ps, other

    cs.CR

    Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs

    Authors: Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere

    Abstract: We propose CrowdPatching, a blockchain-based decentralized protocol, allowing Internet of Things (IoT) manufacturers to delegate the delivery of software updates to self-interested distributors in exchange for cryptocurrency. Manufacturers announce updates by deploying a smart contract (SC), which in turn will issue cryptocurrency payments to any distributor who provides an unforgeable proof-of-de… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: This is a copy of the accepted version at The 19th IEEE International Symposium on Network Computing and Applications (NCA 2020) [Core Rank: A]. The final version appearing in the conference proceedings will have additions and changes

  10. arXiv:2010.05144  [pdf, ps, other

    cs.CR

    Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

    Authors: Syed W. Shah, Naeem F. Syed, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss

    Abstract: Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are ex… ▽ More

    Submitted 10 October, 2020; originally announced October 2020.

    Comments: This is a copy of the accepted version at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020) [Core Rank: A]

  11. arXiv:2005.07987  [pdf, other

    cs.CR

    Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud

    Authors: Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha

    Abstract: Secure and privacy-preserving management of Personal Health Records (PHRs) has proved to be a major challenge in modern healthcare. Current solutions generally do not offer patients a choice in where the data is actually stored and also rely on at least one fully trusted element that patients must also trust with their data. In this work, we present the Health Access Broker (HAB), a patient-contro… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: Copy of the paper accepted at 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS)

  12. arXiv:2004.01855  [pdf, other

    cs.CR

    Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies

    Authors: Dimitri Kamenski, Arash Shaghaghi, Matthew Warren, Salil S. Kanhere

    Abstract: We focus on the problem of botnet orchestration and discuss how attackers can leverage decentralised technologies to dynamically control botnets with the goal of having botnets that are resilient against hostile takeovers. We cover critical elements of the Bitcoin blockchain and its usage for `floating command and control servers'. We further discuss how blockchain-based botnets can be built and i… ▽ More

    Submitted 2 May, 2020; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: This is the 2nd version (improved based on reviewers feedback) of the accepted paper at 13th International Conference on Computational Intelligence in Security for Information Systems

  13. arXiv:1809.06988  [pdf, other

    cs.CR

    Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems

    Authors: Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kaafar, Sanjay Jha

    Abstract: A Software-Defined Network (SDN) controller (aka. Network Operating System or NOS) is regarded as the brain of the network and is the single most critical element responsible to manage an SDN. Complimentary to existing solutions that aim to protect a NOS, we propose an intrusion protection system designed to protect an SDN against a controller that has been successfully compromised. Gwardar mainta… ▽ More

    Submitted 18 September, 2018; originally announced September 2018.

    Comments: Accepted for publication at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018) - Final version published by the conference may slightly differ

  14. arXiv:1807.02593  [pdf, other

    cs.CR cs.NI

    Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations

    Authors: Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kaafar, Elisa Bertino, Sanjay Jha

    Abstract: `Anytime, Anywhere' data access model has become a widespread IT policy in organizations making insider attacks even more complicated to model, predict and deter. Here, we propose Gargoyle, a network-based insider attack resilient framework against the most complex insider threats within a pervasive computing context. Compared to existing solutions, Gargoyle evaluates the trustworthiness of an acc… ▽ More

    Submitted 6 July, 2018; originally announced July 2018.

    Comments: Accepted to IEEE LCN 2018 as full paper, Pre-final version - slightly different than the final version published by the conference

  15. arXiv:1804.00262  [pdf, other

    cs.CR

    Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions

    Authors: Arash Shaghaghi, Mohamed Ali Kaafar, Rajkumar Buyya, Sanjay Jha

    Abstract: Software-Defined Network (SDN) radically changes the network architecture by decoupling the network logic from the underlying forwarding devices. This architectural change rejuvenates the network-layer granting centralized management and re-programmability of the networks. From a security perspective, SDN separates security concerns into control and data plane, and this architectural recomposition… ▽ More

    Submitted 1 April, 2018; originally announced April 2018.

    Comments: This is a copy of the paper to be published by Journal of Cluster Computing

  16. WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks

    Authors: Arash Shaghaghi, Mohamed Ali Kaafar, Sanjay Jha

    Abstract: Networks are vulnerable to disruptions caused by malicious forwarding devices. The situation is likely to worsen in Software Defined Networks (SDNs) with the incompatibility of existing solutions, use of programmable soft switches and the potential of bringing down an entire network through compromised forwarding devices. In this paper, we present WedgeTail, an Intrusion Prevention System (IPS) de… ▽ More

    Submitted 6 July, 2018; v1 submitted 17 August, 2017; originally announced August 2017.

    Comments: Accepted to ASIACCS - Final version, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017

  17. arXiv:1610.02526  [pdf, other

    cs.CR

    Towards Policy Enforcement Point as a Service (PEPS)

    Authors: Arash Shaghaghi, Mohamed Ali, Kaafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay Jha

    Abstract: In this paper, we coin the term Policy Enforcement as a Service (PEPS), which enables the provision of innovative inter-layer and inter-domain Access Control. We leverage the architecture of Software-Defined-Network (SDN) to introduce a common network-level enforcement point, which is made available to a range of access control systems. With our PEPS model, it is possible to have a `defense in dep… ▽ More

    Submitted 8 October, 2016; originally announced October 2016.

    Comments: This is a copy of the paper accepted at IEEE NFV-SDN'16. An extended work based on this paper will be submitted to a journal

  18. arXiv:1609.04514  [pdf, other

    cs.CR

    Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    Authors: Yvo Desmedt, Arash Shaghaghi

    Abstract: Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the fai… ▽ More

    Submitted 15 September, 2016; originally announced September 2016.

    Comments: This paper is a first full version of the paper accepted at ACM CCS 2016, 8th workshop on Managing Insider Threats (MIST). The full version will be submitted at a journal. The authors contributed equally. Current version: 1, updated on 14 Sep. 2016