Skip to main content

Showing 1–12 of 12 results for author: Ghanem, M C

.
  1. arXiv:2501.03898  [pdf

    cs.CR cs.NI cs.OS

    SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory

    Authors: Arslan Tariq Syed, Mohamed Chahine Ghanem, Elhadj Benkhelifa, Fauzia Idrees Abro

    Abstract: The increasing sophistication of modern cyber threats, particularly file-less malware relying on living-off-the-land techniques, poses significant challenges to traditional detection mechanisms. Memory forensics has emerged as a crucial method for uncovering such threats by analysing dynamic changes in memory. This research introduces SPECTRE (Snapshot Processing, Emulation, Comparison, and Threat… ▽ More

    Submitted 7 January, 2025; originally announced January 2025.

    Comments: 23 Version 2.1

  2. arXiv:2410.15028  [pdf

    cs.CR cs.AI

    A Novel Reinforcement Learning Model for Post-Incident Malware Investigations

    Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: This Research proposes a Novel Reinforcement Learning (RL) model to optimise malware forensics investigation during cyber incident response. It aims to improve forensic investigation efficiency by reducing false negatives and adapting current practices to evolving malware signatures. The proposed RL framework leverages techniques such as Q-learning and the Markov Decision Process (MDP) to train th… ▽ More

    Submitted 12 January, 2025; v1 submitted 19 October, 2024; originally announced October 2024.

    Comments: v3, 8 pages. arXiv admin note: substantial text overlap with arXiv:2408.01999

  3. arXiv:2410.11463  [pdf

    cs.CR cs.AI cs.LG

    Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning

    Authors: Animesh Singh Basnet, Mohamed Chahine Ghanem, Dipo Dunsin, Wiktor Sowinski-Mydlarz

    Abstract: The development of the DRL model for malware attribution involved extensive research, iterative coding, and numerous adjustments based on the insights gathered from predecessor models and contemporary research papers. This preparatory work was essential to establish a robust foundation for the model, ensuring it could adapt and respond effectively to the dynamic nature of malware threats. Initiall… ▽ More

    Submitted 7 January, 2025; v1 submitted 15 October, 2024; originally announced October 2024.

    Comments: 21 Pages

  4. arXiv:2409.02572  [pdf

    cs.CR cs.AI cs.ET cs.LG

    GenDFIR: Advancing Cyber Incident Timeline Analysis Through Retrieval Augmented Generation and Large Language Models

    Authors: Fatma Yasmine Loumachi, Mohamed Chahine Ghanem, Mohamed Amine Ferrag

    Abstract: Cyber timeline analysis, or forensic timeline analysis, is crucial in Digital Forensics and Incident Response (DFIR). It examines artefacts and events particularly timestamps and metadata to detect anomalies, establish correlations, and reconstruct incident timelines. Traditional methods rely on structured artefacts, such as logs and filesystem metadata, using specialised tools for evidence identi… ▽ More

    Submitted 27 December, 2024; v1 submitted 4 September, 2024; originally announced September 2024.

    Comments: 24 pages V5.3

  5. arXiv:2408.01999  [pdf

    cs.CR cs.AI cs.ET

    Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response

    Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: This research focused on enhancing post-incident malware forensic investigation using reinforcement learning RL. We proposed an advanced MDP post incident malware forensics investigation model and framework to expedite post incident forensics. We then implement our RL Malware Investigation Model based on structured MDP within the proposed framework. To identify malware artefacts, the RL agent acqu… ▽ More

    Submitted 7 January, 2025; v1 submitted 4 August, 2024; originally announced August 2024.

    Comments: 21 pages

  6. arXiv:2404.05602  [pdf

    cs.CR cs.ET cs.NI

    AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments

    Authors: Mohammed Ashfaaq M. Farzaan, Mohamed Chahine Ghanem, Ayman El-Hajjar, Deepthi N. Ratnayake

    Abstract: The escalating sophistication and volume of cyber threats in cloud environments necessitate a paradigm shift in strategies. Recognising the need for an automated and precise response to cyber threats, this research explores the application of AI and ML and proposes an AI-powered cyber incident response system for cloud environments. This system, encompassing Network Traffic Classification, Web Int… ▽ More

    Submitted 12 January, 2025; v1 submitted 8 April, 2024; originally announced April 2024.

    Comments: v4 Post Round 2 Peer Review

  7. arXiv:2403.13843  [pdf, other

    cs.LG cs.AI eess.IV

    Machine Learning and Transformers for Thyroid Carcinoma Diagnosis: A Review

    Authors: Yassine Habchi, Hamza Kheddar, Yassine Himeur, Mohamed Chahine Ghanem

    Abstract: The growing interest in developing smart diagnostic systems to help medical experts process extensive data for treating incurable diseases has been notable. In particular, the challenge of identifying thyroid cancer (TC) has seen progress with the use of machine learning (ML) and big data analysis, incorporating Transformers to evaluate TC prognosis and determine the risk of malignancy in individu… ▽ More

    Submitted 14 April, 2025; v1 submitted 17 March, 2024; originally announced March 2024.

  8. arXiv:2312.01219  [pdf

    cs.CR cs.DC

    A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response

    Authors: Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem

    Abstract: Intrusion detection systems perform post-compromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analysed and triaged by security analysts. This process is largely manual, tedious and time-consuming. Alert correlation is a technique that tries to reduce the number of intrusion… ▽ More

    Submitted 18 January, 2025; v1 submitted 2 December, 2023; originally announced December 2023.

    Comments: version 4

  9. A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response

    Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes… ▽ More

    Submitted 3 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: version 2 post peer review Forensic Science International Digital Investigation

    Report number: Volume 48, 301675

    Journal ref: Forensic Science International: Digital Investigation, 2024

  10. arXiv:2309.05537  [pdf

    cs.CR cs.IR cs.NI cs.OS

    D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

    Authors: Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin

    Abstract: The use of the un-indexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is an in-famously dangerous place where all kinds of criminal activities take place [1-2], despite advances in web forensics techniques, tools, and methodologies, few studies have formally tackled the dark and deep web fo… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  11. arXiv:2307.10967  [pdf

    cs.CR cs.NI

    ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance

    Authors: Mohamed C. Ghanem, Thomas M. Chen, Mohamed A. Ferrag, Mohyi E. Kettouche

    Abstract: The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Security Compliance (SC) methods to identify security gaps and anticipate security breaches. In the computer networks context and despite the use of autonomo… ▽ More

    Submitted 19 January, 2025; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: v5

  12. arXiv:2307.07293  [pdf

    cs.CR cs.MM

    StegoHound: A Novel Multi-Approaches Method for Efficient and Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files

    Authors: Mohamed C. Ghanem, Maider D. Uribarri, Ramzi Djemai, Dipo Dunsin, Istteffanny I. Araujo

    Abstract: Anti-forensics techniques particularly steganography and cryptography have become increasingly pressing issues that affect the current digital forensics practice. This paper advances the automation of hidden evidence extraction in the context of audio files by proposing a novel multi-approaches method which enables the correlation between unprocessed artefacts, indexed and live forensics analysis… ▽ More

    Submitted 10 December, 2023; v1 submitted 14 July, 2023; originally announced July 2023.

    Comments: Journal of Information Security and Cybercrimes Research- Post Review V3.1

    Report number: ol. 6, no. 2, pp. 89-104

    Journal ref: JISCR 2023