ICCWS2020 Booklet
ICCWS2020 Booklet
Conference Booklet
Contents
Welcome Notes……………………………………………………………………………….02
Organizing Committee…………………………………………………………………….… 05
Keynotes and Technical Talks………………………………………………………………08
Paper Abstracts……………………………………………………………………………… 14
Conference Program…………………………………………………………………………20
1 International Conference on Cyber Warfare and Security
Javaid Ahmed
Vice Chancellor, Air University
Dear Participants,
I am pleased to welcome you in this 1st Annual International Conference on Cyber Warfare and Security (ICCWS)
organized by National Centre for Cyber Security (NCCS) Pakistan. Cyber Security is a big challenge costing the
world billions of dollars losses annually. There is indeed dearth of professionals as this field is constantly evolving
with new vulnerabilities and attacks emerging every day. The fast growth of this technology domain demands that
we train lot of professionals at a matching pace. Covid-19 pandemic has proved to be another big game changer
as we are adapting to the dynamics of cyber world but at the same time the associated vulnerabilities with digital
space are required to be adequately dealt with.
From academia perspective, quality cyber security education and trainings are crucial for bridging this very
important gap. One of the key challenge is to equip students with practical knowledge and skills to effectively tackle
cyber security threats. To abridge this gap, NCCS is playing a vital role to promote research and development
activities and establishing academia-industry linkages across the country. ICCWS-2020 is a key initiative of NCCS
to provide a scientific platform to the researchers and experts from across the world to share their experiences and
proficiencies related to the cyber security domain.
ICCWS-2020 will include high-quality and focused technical program on cyber security with keynote talks from
prominent industry and academia experts. The research presented in this conference will be good contribution and
value addition in the educational resources and knowledge repositories. The conference will provide networking
opportunities to the researchers, students, developers and cyber security professionals from the industry, academia
and government organizations. I believe that this conference will provide new opportunities for more national and
international collaborations among the stakeholders.
I would like to thank national and international speakers, researchers as well as participants for joining us in this
virtual conference. We are especially pleased with the generous support of international speakers including Mr.
Fred Baker and Prof. Vern Paxson from USA, Mr. Andrey Golov, Mr. Dmitry Zryachikh and Mr. Evgeny Goncharov
from Russia, Dr. Mehmat Akif Nacar, Mr. Murat Husseiyn Candan, and Mr. Abdullah Erten from Turkey, Prof. Dr.
Siraj Shaikh from UK, Prof. Dr. Olaf Maennel from Estonia and Ms. Jean Daka from Belgium. I convey my best
wishes to all the organizers of 1st IEEE ICCWS 2020.
2 International Conference on Cyber Warfare and Security
Director NCCS
Dear Participants,
National Centre for Cyber Security (NCCS) was established in June 2018 by Planning Commission of Pakistan
through Higher Education Commission (HEC). The Centre constitutes Research and Development (R&D) Labs in
11 reputed universities of Pakistan. These partner Labs were established in different specialized areas of cyber
security such as software security, networks security, smart devices and IoT security, Internet security and privacy,
security auditing and testing, critical infrastructure security, Blockchain security, digital forensics and cybercrimes.
The objective of NCCS is to instigate R&D activities, producing skilled human resource as well as the development
of indigenous products and practical applications/toolkits in the specialized domain of Cyber Security to contribute
its part in the protection of national cyberspace. The secretariat of NCCS is housed at Air University Islamabad.
ICCWS-2020 is the first IEEE technical sponsored educational conference in Pakistan that is solely focused on
cyber security. The agenda of this conference covers a wide range of topics related to recent advances in the field
of cyber security and its allied areas. In this two days conference event, researchers and practitioners working in
cyber security and related domains will share their research ideas and experiences related to the state-of-the-art
as well as in the emerging areas of cyber security. In total, 171 papers were submitted from 16 different countries
out of which 23 papers will be presented in ICCWS. These papers were selected through a double blind peer-
review process by the technical program committee comprised of renowned cyber security academicians from
national and international universities. Moreover, keynote speeches and technical talks by leading cyber security
experts from across the world will be part of conference program along with 2 well-focused panel discussions. I
hope that the challenges and opportunities identified by the keynote speakers and panelists will help well in
recognizing cyber security importance, developing better understanding and resilience within the respective
organizations, stakeholders as well in personal life.
We warmly welcome all the national and international participants and encourage them to share their knowledge
and discuss the way forward for creating cyber security awareness and making Pakistan a digitally secure and safe
place to live and work online. We also appreciate our collaborators, sponsors and supporters, without their support
we would not be able to organize this event. We hope you find ICCWS-2020 a valuable experience.
3 International Conference on Cyber Warfare and Security
ORGANIZING COMMITTEE
Patron:
General Chair:
Kashif Kifayat, National Centre for Cyber Security, Air University Islamabad, Pakistan
Program Chair:
Amir Qayyum, Capital University of Science and Technology, Lahore, Pakistan
Panel Chairs:
Adil Sultan, Air University Islamabad, Pakistan
Shoab A. Khan, National University of Sciences and Technology, Islamabad, Pakistan
Finance Committee:
Chair: Tariq Javed Kamboh, Air University Islamabad, Pakistan
Co-Chair: Usman Ghani, National Centre for Cyber Security, Air University, Pakistan
Name Affiliation
1. Vern Paxson (UC Berkeley, USA)
2. Qi Shi (Liverpool John Moores, UK)
3. Olaf Manuel (Tallinn University of Technology, Estonia)
4. Dan DongSeong KIM (University of Queensland, Australia)
5. Hafiz Malik (Dearborn Michigan, USA)
6. Siraj Ahmed Shaikh (Coventry University, UK)
7. Zahri Yunos (CyberSecurity Malaysia, Malaysia)
8. Syed Naqvi (Birmingham City University, UK)
9. Jean Daka (DELOITTE, Belgium)
10. Kashif Kifayat (Air University, Islamabad, Pakistan)
11. Haider Abbas (MCS, NUST, Rawalpindi, Pakistan)
12. Zartash Uzmi (LUMS, Lahore, Pakistan)
13. Mudassar Farooq (Air University, Islamabad, Pakistan)
14. Ejad Ahmed (University of Malaya, Malaysia)
15. Ammar Masood (Air University, Islamabad, Pakistan)
16. Mehdi Hassan (Air University, Islamabad, Pakistan)
17. Zunera Jalil (Air University, Islamabad, Pakistan)
18. Bilal Afzal (NCCS, Air University, Islamabad, Pakistan)
19. Naveed Bhatti (Air University, Islamabad, Pakistan)
20. Jawad Manzoor (Air University, Islamabad, Pakistan)
21. Sidra Siddique (Air University, Islamabad, Pakistan)
22. Fawad Khan (MCS, NUST, Islamabad, Pakistan)
23. Ghalib A. Shah (UET Lahore, Pakistan)
24. M. Waseem Iqbal (MCS, NUST, Islamabad, Pakistan)
25. Khawaja Mansoor (Air University, Islamabad, Pakistan)
26. Ali Hammad Akbar (UET Lahore, Pakistan)
27. Ubaid Ullah Fayyaz (UET Lahore, Pakistan)
28. Amir Mehmood (UET Lahore, Pakistan)
29. Haroon Mahmood (FAST Lahore, Pakistan)
7 International Conference on Cyber Warfare and Security
KEYNOTE TALKS
ICANN RSSAC Chair / Former IETF Chair, USA University of California, Berkeley / Corelight, Inc.
Berkeley, USA
Talk Title: Management of Security in the Domain Talk Title: Finding Very Damaging Needles in Very
Name System Large Haystacks
Abstract: One fundamental principle in the Internet is Abstract: Many of the most costly security
the End to End Principle. It could be stated in this way: compromises that enterprises suffer manifest as tiny
the one valid thing for any layer of service software trickles of behavior hidden within oceans of other site
(including the Internet Protocol and common activity. This talk will examine the problem of
transports) is to carry out the intent of its user. Almost developing robust detectors for particular forms of
all Internet attacks can be described in terms of a such activity. The themes include research pitfalls, the
violation of that principle - the packet is inspected by crucial need to leverage domain knowledge in an apt
or delivered to an unauthorized party, not delivered at fashion, and why machine learning is difficult to
all, the predictable response is sent to a different effectively apply to such problems
party, the service is overwhelmed, the user is
confused in some way that results in an access to an
unintended service, or any of a long list of similar
schemes. The talk will discuss technologies in use in
the DNS to prevent such attacks in what might seem
the simple posing of a question and it’s a resulting
answer
.
9 International Conference on Cyber Warfare and Security
Talk Title: Russian semiconductor / microelectronic Talk Title: Trends and challenges of Industrial Cyber
industry overview Security highlighted by Covid-19 pandemic
Abstract: Standard x86 architecture is far from Abstract: Covid-19 pandemic is definitely the most
enough when it comes to trusted system developing. spoken topic of the year. The pandemic has brought
It doesn’t matter how solid your software is if you struggling and sorrow to millions. Billions had to adjust
cannot be fully sure in hardware level. Dmitry will give their life habits. And it made almost every single
a brief overview about key factors of x86 substitution person on the planet feel insecure. It did not even
for network security appliances and describe key make us more vulnerable. Rather, it highlighted our
challenges we met during this process existing vulnerability. From this perspective the
current pandemics situation is not only a challenge,
but also a huge potential game changer, which may
give us an opportunity to see things different, and to
see some things important that we did not see before.
As the team conducting threat research and
vulnerability analysis to Industrial Control Systems,
we notice it has also highlighted some major
vulnerabilities and cyber security problems of
industrial infrastructures. And many of the problems
highlighted we believe are absolutely important to
solve for the vast majority of modern industrial
enterprises to unlock possibility of the IoT and
Industry 4.0 technological benefits. This talk will cover
the facts discovered during the pandemic period,
major challenges noticed and some trends and
tendencies we may foresee from where we are now.
10 International Conference on Cyber Warfare and Security
Bio: Andrey Golov is the Chief Executive Officer at Bio: Mehmet Akif NACAR was born in Sanliurfa,
Trusted Access Technologies. He has more than 15 Turkey in 1972. He received the B.S. degree in
years of executive experience on IT and Security Computer Engineering from Trakya University,
positions in different civil and military organizations. Edirne, Turkey in 1995. Then M.S. degrees in
Andrey also is CEO of Security Code ltd (Russia), one computer education from Gazi University, Ankara,
of the famous leading vendors in Russia related to Turkey in 1998 and computer science in Syracuse
Network, Endpoint and Virtual security. Andrey has University, Syracuse, NY in 2000. He completed his
degree in mathematics/cryptography, financial Ph.D. degree in computer science in Indiana
analysis and MBA degree in IT management. And he University, Bloomington, IN in 2008. From 2001 to
got numerous industry awards and certifications 2008, he was a Graduate Assistant with Indiana
including Certified Information Systems Security University Community Grids Lab. Since 2008, he has
Professional (CISSP), Certified Information Security been an Assistant Professor with the Computer
Auditor (CISA) and Business Continuity Institute Engineering Department, Harran University,
specialist. Andrey has also experience in Cyber Sanliurfa, Turkey. He has involved in many research
Security of International Cyber Space and global projects supported by NSF and DoE. During the work
international cooperation. Andrey has also with Harran University, he was awarded for a few
participated in various international MOU and research projects. He has worked as the vice
intergovernmental missions president in HAVELSAN Training and Simulation
Technologies Department since 2017. He is the
general manager of HAVELSAN since 2020. His
research interests include high-performance systems
within parallel and grid computing, cloud computing
and developing software models for energy efficiency
applications.
11 International Conference on Cyber Warfare and Security
Abstract: The talk would provide a brief overview of Abstract: The aviation industry has embraced a
some of the challenges in defending cyber-physical safety-oriented culture probably more than any other
systems, and then run through some key areas of transport sector. However, from a cybersecurity
development in this domain. It will dive into some perspective it is increasingly vulnerable. Previously
technical areas to reflect on some areas of design, separate systems are now being interconnected in
policy and behavior, and engineering to address order to enhance efficiencies, reduce costs and
systems security. improve the customer experience. However, this
exposes new vulnerabilities that may be exploited by
a variety of threat actors. These range from nation
states to cyber criminals who will see aviation as an
attractive target for financial gain, invading privacy or
just creating chaos. Airport systems running
commercial software are also at risk from
indiscriminate attacks targeting any insecure Internet
connected network that can be remotely accessed.
The unique attributes of the aviation sector serve as a
good example of how cybersecurity research needs
to develop systems able to resist and counter multiple
attack vectors. In our research we demonstrate that
securing the aviation industry requires a holistic and
wide-ranging approach incorporating aspects from
both technical and social science disciplines.
12 International Conference on Cyber Warfare and Security
Talk Title: Post quantum state of cryptology Talk Title: The challenges of digital forensics
Abstract: His talk will be mainly around the post Abstract: Digital evidence has transformed from a
quantum state of cryptology. The challenges that the single host such as a desktop computer with an
whole cyber world will suffer when the computer attached usb drive to different physical or virtual
power dramatically rises will be assessed. How locations such as the cloud and social networks. This
cryptology will evolve to compensate for the rising makes the challenge of reconstructing the evidence to
computing power will be discussed as well. Post find ‘the smoking gun’ more complex. Digital forensic
quantum changes in terms of battlefield and warfare investigators need to keep the pace with
will be analyzed advancement in technology and the intricacies of
perpetrators by using the right tools that allow them to
do their work in a manner that allows evidence to be
admissible in a court of law whilst maintaining a
forensically sound audit trail. We will look into some
challenges faced and some tools investigators use to
accomplish this.
13 International Conference on Cyber Warfare and Security
Talk Title: Zero Day Trust Architecture Talk Title: State of Cyber Security
Bio: Ahrar Naqvi is the CEO of Ebryx, a company he Bio: Mr. Murat H. CANDAN is the CEO of Barikat
founded in 2008 in the US and Pakistan. Ebryx is the Cyber Security. He has been working on various
developer of a Zero Trust Network Access product. Its cyber security roles for the last 20 years and has
R&D services power some of the world’s leading presented among many security events discussing
products in network security, endpoint security and state and improvements for cyber security.
insider threat detection. Ebryx also offers security
assessments, compliance, SOC, incident response
and digital forensics services. Its customers include
local banks, Silicon Valley tech startups and Fortune
500 companies. Before Ebryx, Ahrar was EVP
Engineering at Silicon Valley based Palmchip; Chief
Architect at Veraz Networks and a product architect at
Oracle. Ahrar has an MS in Electrical Engineering
from Stanford University.
14 International Conference on Cyber Warfare and Security
Identifying Mirai-Exploitable Vulnerabilities in IOT encryption algorithm with the provision of protection
Firmware through Static Analysis against the side channel and nonce misuse attack. The
lightweight encryption algorithm utilizes an AES like
Authors: Zafeer Ahmed, Ibrahim Nadir, Haroon rounds architecture with reduced rounds to reduce area
Mahmood, Ali Hammad Akbar, Ghalib Asadullah Shah consumption and high-throughput provision. Its
implementation of software and hardware validates the
Abstract: The prevalent use of IoT has raised numerous lightweight encryption algorithm. The lightweight
security concerns in recent times. One particular encryption algorithm provides similar avalanche effects,
vulnerability in IoT ecosystem is weak authentication as shown by the Advanced Encryption Standard (AES)
credentials. A large number of IoT attacks exploit such algorithm. The lightweight encryption algorithm utilizes
vulnerabilities. Emerged in 2016, the famous Mirai sub-algorithms for the randomization of Initialization
malware conducts attacks that benefits from poorly Vector (IV) and the generation of randomizing keys for
chosen username and passwords. Since its advent, every cipher text. The encryption algorithm is compared
Mirai attacks have only increased with time. Although with the recent implementations for resource
multiple solutions have been suggested in literature comparison and security analysis.
based on dynamic packet analysis but existing solutions
are expensive and are mostly based on reactionary Elixir A 128-bit Stream Cipher Protocol for
measures. In this research work, we propose a scalable Lightweight IOT Devices
solution to audit the security of IoT firmware against the
Mirai attack. Furthermore, we test our system by
statically analyzing more than 1200 recent firmware Authors: Muhammad Umair Tariq, Danial Gohar, Talal
images to inspect their resistance against Mirai botnet. Hassan, Ali Afzal Awan
Our results show that 193 out of 1200+ firmware images
are susceptible to Mirai malware. To get effective
Abstract: Over time, the Internet of Things (IoT) has
results, we tested our solution against a variety of IoT
turned out to be most prevalent in the field of research
devices’ firmware images. We conclude that our solution
and its applications. However, IoT devices are resource
is more scalable, less expensive and proactive as
constraints and thus, require lightweight and secure
compared to other solutions.
ciphering protocols. This paper proposes a new
lightweight stream cipher algorithm named as ‘Elixer’,
Lightweight Encryption Algorithm Implementation based upon classical 128-bit non-linear feedback shift
for Internet of Thing Application register technique. This stream cipher is based on static
and dynamic substitution-boxes with shift operations
Authors: Syed Jahanzeb Hussain Pirzada, Tongge Xu, and results in an output key stream. Confusion and
Liu Jianwei diffusion properties are added with the help of
substitution and transposition techniques respectively.
In the core design of Elixir, there are eight static 6 x 8 s-
Abstract: Internet of Things (IoT) application utilizes
boxes and two dynamic s-boxes. The correctness of the
devices with limited hardware resources such as the
proposed stream cipher is tested according to NIST
wireless sensor network application and devices with
randomness standards and Stream tests. Elixir is
sufficient hardware resources such as satellite
designed to be implemented easily and efficiently for
applications. The main challenge is to design a
both Hardware and Software implementations.
lightweight encryption algorithm to be implementable on
devices with limited hardware resources in IoT
applications. This work proposes a lightweight
15 International Conference on Cyber Warfare and Security
Nondeterministic Secure LSB Steganography for becoming doubtful thereby losing credibility and
Digital Images truthfulness. Therefore, proving the content realism of an
image is an imperative matter. Commonly used type of
digital image forgery is copy-move that is carried out in
Authors: Khan Farhan Rafat
the same image by pasting specific region to another
semantically similar region. In this study, a technique is
Abstract: The practice of obscuring information on a proposed for detecting image forgery by using discrete
‘need to know’ basis, but still sharing it with others, is wavelet transform (DWT). Compared to Fourier
called ‘secrecy. ’The information that requires transform (FT), DWT is more suitable to analyze image
fortification is known as the secret. However, the pace at contents on edges or abrupt changes in color contrast.
which data gets generated, gathered, disseminated, and The DWT decomposes the image into 4 sub-bands.
Approximation sub-band is employed to implement the
analyzed in today’s Internet of Things (IoT)has inhibited
present method. DWT reduces the size of the image
the individuals from keeping their secrets ‘secret.’ Cloud which in turn minimizes the execution time of the
computing further hardened the situation by providing a algorithm. The experiment results of the proposed
pay-as-you-go method for data processing and technique revealed that this approach is effective in
information retention (persistent storage). Although the detecting and localizing the copy-moved region.
cloud service providers are bound to maintain data Therefore, the presented technique can be used for
integrity, confidentiality, and the privacy of users, yet the CMIF detection and benefits can be obtained in different
fields such as the judiciary, media, and crime
gray areas of proxy points still await a resolution. The
investigation.
judicial endorsement on gaining and having access to
the encrypted data and the pre-shared keys to the law-
Byte-Level Object Identification for Forensic
enforcing authorities by the Australian parliament – the
first amongst the five-eye countries inspecting the global
Authors: Dr. Zunera Jalil, Abdul Rehman
communication has worsened the situation further.
Hence, the current state of affairs not just demand for
Abstract: Lately, digital data has increased a key role in
information hiding but the evolution of ‘secure’
providing and sharing information. Pictures and video
information hiding solutions to maintain secrecy both at
recordings are utilized to pass on convincing messages
the personal and national level. Least Significant Bit
to be utilized under a few unique situations, from
embedding technique for hiding data has brought a stir
propaganda to coercing. The majority of the effort in the
in the information security arena and since its inception
present digital crime investigation network lies in the
has remained a topic of research for the said purpose.
acquisition, retrieval, and investigation of existing data
This research endeavor proposes an enhancement to
from digital machines. It is a time consuming and a
the existing LSB embedding mechanism to deceive
humanly difficult task to collect, process and analyze
attackers from detecting hidden information but without
each media content manually. In this paper, we provide
compromising image perceptibility. The results confer on
a novel approach that solves a real-time problem for an
the effectiveness of the proposed algorithm with regard
investigator while investigating the suspect machine.
to Peak Signal to Noise Ratio and known-cover attack
Our approach acquires all image data at byte level from
scenario.
the suspect machine, perform fast and accurate object
detection resorting to the deep learning-based algorithm
An Efficient Forensic Approach for Copy-move
and present high-level illustration of images containing
Forgery Detection via Discrete Wavelet Transform
suspicious object and unique objects that can be
presented as evidence. Our approach aims to flag
Authors: Rehan Ashraf, Muhammad Sheraz Mehmood,
photos where suspicious objects are detected.
Toqeer Mahmood, Junaid Rashid, Muhammad Wasif
Performance and time consumption wise, this study
Nisar, Mohsin Shah
confirms the importance of automated object detection
Abstract: In this modern era, due to advancements in in digital forensics.
image processing applications; image forgery can be
easily performed and difficult to locate by the bare eye.
Therefore, the digital images and its content are
16 International Conference on Cyber Warfare and Security
Vulnerabilities and Digital Violations in Software An Enhanced and Secure Multiserver-based User
Products: Logistic Regression Analysis Authentication Protocol
Authors: Shahid Anjum, Effah Wafiyyah Authors: Mehmood Hassan, Aiman Sultan, Ali Afzal
bintiAwangMohd. Hanafi Awan, Shahzaib Tahir, Imran Ihsan
Analysis of Fileless Malware and its Evasive An Enhanced SIP Authentication Protocol for
Behavior Preserving User Privacy
Abstract: Malware is any software that causes harm to Abstract: Owing to the advancements in
the user information, computer systems or network. communication media and devices all over the globe,
Modern computing and internet systems are facing there has arisen a dire need for to limit the alarming
number of attacks targeting these and to enhance their
increase in malware threats from the internet. It is
security. Multiple techniques have been incorporated in
observed that different malware follows the same different researches and various protocols and schemes
patterns in their structure with minimal alterations. The have been put forward to cater security issues of session
type of threats has evolved, from file-based malware to initiation protocol (SIP). In 2008, Qiu et al. presented a
fileless malware, such kinds of threats are also known proposal for SIP authentication which while effective
as Advance Volatile Threat (AVT). Fileless malware is than many existing schemes, was still found vulnerable
complex and evasive; exploiting pre-installed trusted to many security attacks. To overcome those issues,
Zhang et al. proposed an authentication protocol. This
programs to infiltrate information with its malicious intent.
paper presents the analysis of Zhang et al.
Fileless malware is designed to run in system memory authentication scheme and concludes that their
with a very small footprint, leaving no artifacts on proposed scheme is susceptible to user traceability. It
physical hard drives. Traditional antivirus signatures and also presents an improved SIP authentication scheme
heuristic analysis are unable to detect this kind of that eliminates the possibility of traceability of user’s
malware due to its sophisticated and evasive nature. activities. The proposed scheme is also verified by
contemporary verification tool, ProVerif and it is found to
This paper provides information relating to detection,
be more secure, efficient and practical than many similar
mitigation and analysis for such kind of threat. SIP authentication scheme.
Automatic YARA Rule Generation
Cluster Analysis and Statistical Modeling: A Unified
Authors: Myra Khalid, Maliha Ismail, Mureed Hussain, Approach for Packet Inspection
Muhammad Hanif Durad
Authors: Sheikh Muhammad Farjad, Asad Arfeeny
primary format, this research paper presents an and then the attack is launched in the second step. Since
approach that employs Packet Capture (PCAP) data a port is an attack surface as all the information goes into
format for network analysis. The clustering technique and out of a computer through this medium. Therefore in
can be used for classifying benign and malicious traffic
port scanning, available open ports are searched over
but there may arise many uncertainties caused by
various dynamic factors due to emerging application the network to find out the vulnerable machine that can
mixture. Our proposed model uses statistical modeling be exploited. Many slow port scan detection solutions
for supplementing the results obtained from clustering. were proposed in the literature; however, all of these
This unified approach for traffic analysis reduces the approaches use methods to detect the slow port scan
chances of the false alert generation that substantially attacks over the static time period. The approach
deteriorates the security ecosystem. The proposed proposed in this paper can detect the slow port scanning
architecture inspects different parameters of network
attacks not just over the static time interval but also all
traffic to uncover any strong correlation for identifying
malicious network traffic flows. the attacks that are made with a gradual increase or
decrease in the time duration. Moreover, this new
Design and Analysis of Secure RoF Based proposed approach is employed to detect attacks over
Communication in 5G Front haul live data also. Further packet-based analysis is
performed to detect the different types of port scan
Authors: Arsalan Ali, Romana Shahzadi, Nouman attacks. The best of all the accuracy of different scans is
Qamar
implemented. The proposed approach also classifies the
single and parallel port scans based on attempts made.
Abstract: An analytical study is presented in this paper
related to the emerging 5G network based on radio over Therefore the difference between the faster scans and
fiber communication. Security of 5G front haul is ensured the slower ones is achieved.
by using chaos in optical domain. Optical chaos
generated by semiconductor laser is used for this Role of User and Entity Behavior Analytics in
purpose. Optical fiber is chosen to provide high Detecting Insider Attacks
bandwidth and minimum latency whereas chaos
masking technique is used to implement the security Authors: Salman Khaliq, Zain ul Abideen Tariq, Ammar
features. In this work, a Radio over fiber (RoF) Masood
communication system is designed in licensed version
of Opti-system software v.14.0 in which radio frequency Abstract: Traditional cyber security products are neither
signal is modulated on optical signal by using laser and designed nor capable of detecting sophisticated and
Mach-Zehnder modulator (MZM). Chaos generation is carefully crafted insider attacks. The main focus of these
represented by rate equations of laser. Message signal cyber security products is on the red interface, the
is secured by hiding it in the chaotic carrier produced by outside attackers; ignoring the green side, the legitimate
semiconductor laser. After transmission the original users. Moreover traditional cyber security products do
signal is retrieved through perfect synchronization not provide complete vision of user activities within the
between transmitter and receiver, thus maximizing not organization. User and Entity Behavior Analytics (UEBA)
only Q-factor but reduced bit error rate (BER) as well. has become an important aspect in organization’s
System performance is evaluated by using different security because the legitimate users have more rights
lengths of optical fiber and varying laser power. and access over the organization resources as
compared to outsiders. Also, the users are not aware of
Detection of Slow Port Scanning Attacks the security threats that may cause huge damage to
organization’s confidential information and intellectual
property. We discuss the different approaches used in
Authors: Mehrul Nisaa, Kashif Kifayat
User and Entity Behavior Analytics (UEBA) including
user and role-based detection, user and entity activity
Abstract: Cyber Security can be thought of as a set of mapping, user profiling techniques and risk score
techniques used to protect the secrecy, integrity, and calculations of individuals. We present the UEBA
availability of computer data against threats. Scanning approaches proposed in literature and generalized
attack itself is not a technique; In fact, it is a two-step design and feature set of top level commercially
procedure in which scanning is the first step where the available UEBA solutions. We also highlight the fact that
open source community still lags behind in giving a
vulnerability of communication channels are discovered
sophisticated UEBA solution.
19 International Conference on Cyber Warfare and Security
CONFERENCE PROGRAM
Day 2 (Continue)
22 International Conference on Cyber Warfare and Security
Prof. Dr. Kashif Kifayat, Director NCCS When: October 20th – 21st 2020, 09.00 am- 5.00 pm (GMT+5)
Email: [email protected]
Bilal Afzal, Program Manager, NCCS Where: Online, Live on Zoom / Social Media
Email: [email protected]
www.nccs.pk
Securing Your Cyber Future
International Conference on Cyber Warfare and Security
Notes
International Conference on Cyber Warfare and Security
Notes