Cybersecurity

The PermGuard dataset is a carefully crafted Android Malware dataset that maps Android permissions to exploitation techniques, providing valuable insights into how malware can exploit these permissions. It consists of 55,911 benign and 55,911 malware apps, creating a balanced dataset for analysis. APK files were sourced from AndroZoo, including applications scanned between January 1, 2019, and July 1, 2024. A novel construction method extracts Android permissions and links them to exploitation techniques, enabling a deeper understanding of permission misuse.

Categories:
204 Views

This dataset was developed in the context of the NANCY project and it is the output of the experiments involving cyberattacks against services that are running in a 5G coverage expansion scenario. The coverage expansion scenario involves a main operator and a micro-operator which extends the main operator’s coverage and can also provide additional services, such as Artificial Intelligence-based cyberattack detection.

Categories:
265 Views

The security of Internet of Things (IoT) networks has become a major concern in recent years, as the number of connected objects continues to grow, thereby opening up more potential for malicious attacks. Supervised Machine Learning (ML) algorithms, which require a labeled dataset for training, are increasingly employed to detect attacks in IoT networks. However, existing datasets focus only on specific types of attacks, resulting in ML-based solutions that struggle to generalize effectively.

Categories:
294 Views

The increasing integration of cyber-physical systems in industrial environments has under scored the critical need for robust security measures to counteract evolving cyber threats. In response to this need, this work introduces an open-source dataset designed to enhance the development and evaluation of cybersecurity solutions for smart industries. The dataset comprises a traffic capture of an industrial control system (ICS) subjected to a variety of simulated cyber-attacks, including but not limited to denial of service (DoS), man-in-the-middle (MITM), and malware infiltration.

Categories:
1152 Views

Smart grids are nowadays featured by distributed energy resources, both renewables, traditional sources and storage systems. Generally, these components are characterized by different control technologies that interact with the generators through smart inverters. This exposes them to a variety of cyber threats. In this context, there is a need to develop datasets of attacks on these systems, in order to evaluate the risks and allow researchers to develop proper monitoring algorithms.

Categories:
660 Views

5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices.

Categories:
3807 Views

You don’t need to be a cybersecurity expert to know that the world of application security is changing at an alarming pace. The tools and techniques that attackers use are becoming more sophisticated, and it’s difficult for even the most well-resourced organizations to keep up with them.

Categories:
154 Views

The security testing focuses on evaluating the security of the web, mobile, networks, API, SaaS, blockchain & cloud applications by methodically validating & verifying the effectiveness of security controls. The process involves an active analysis of any application for any available weaknesses, technical flaws, or vulnerabilities.

 

The security audit scope of work will include:

Categories:
437 Views

The IEEE 24 bus system is modelled in Digsilent’s Power factory, and normal operating data points are generated under quasi dynamic simulation and N-2 contingencies.  An optimization problem to generate false data injection attack vectors are then modelled using MATLAB. This data contains normal, contingency and attack data points for the necessary variables in a power network. The attack data has 5 parts, with each part generated by a different type of attack.

Categories:
1477 Views

Pages