Skip to main content

Showing 1–7 of 7 results for author: Dunsin, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.03993  [pdf, ps, other

    cs.CR cs.ET cs.LG

    MalVol-25: A Diverse, Labelled and Detailed Volatile Memory Dataset for Malware Detection and Response Testing and Validation

    Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Eduardo Almeida Palmieri

    Abstract: This paper addresses the critical need for high-quality malware datasets that support advanced analysis techniques, particularly machine learning and agentic AI frameworks. Existing datasets often lack diversity, comprehensive labelling, and the complexity necessary for effective machine learning and agent-based AI training. To fill this gap, we developed a systematic approach for generating a dat… ▽ More

    Submitted 5 July, 2025; originally announced July 2025.

    Comments: 6 pages

  2. arXiv:2410.15028  [pdf

    cs.CR cs.AI

    A Novel Reinforcement Learning Model for Post-Incident Malware Investigations

    Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: This Research proposes a Novel Reinforcement Learning (RL) model to optimise malware forensics investigation during cyber incident response. It aims to improve forensic investigation efficiency by reducing false negatives and adapting current practices to evolving malware signatures. The proposed RL framework leverages techniques such as Q-learning and the Markov Decision Process (MDP) to train th… ▽ More

    Submitted 12 January, 2025; v1 submitted 19 October, 2024; originally announced October 2024.

    Comments: v3, 8 pages. arXiv admin note: substantial text overlap with arXiv:2408.01999

  3. arXiv:2410.11463  [pdf

    cs.CR cs.AI cs.LG

    Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning

    Authors: Animesh Singh Basnet, Mohamed Chahine Ghanem, Dipo Dunsin, Wiktor Sowinski-Mydlarz

    Abstract: The development of the DRL model for malware attribution involved extensive research, iterative coding, and numerous adjustments based on the insights gathered from predecessor models and contemporary research papers. This preparatory work was essential to establish a robust foundation for the model, ensuring it could adapt and respond effectively to the dynamic nature of malware threats. Initiall… ▽ More

    Submitted 7 January, 2025; v1 submitted 15 October, 2024; originally announced October 2024.

    Comments: 21 Pages

  4. arXiv:2408.01999  [pdf

    cs.CR cs.AI cs.ET

    Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response

    Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: This research focused on enhancing post-incident malware forensic investigation using reinforcement learning RL. We proposed an advanced MDP post incident malware forensics investigation model and framework to expedite post incident forensics. We then implement our RL Malware Investigation Model based on structured MDP within the proposed framework. To identify malware artefacts, the RL agent acqu… ▽ More

    Submitted 7 January, 2025; v1 submitted 4 August, 2024; originally announced August 2024.

    Comments: 21 pages

  5. A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response

    Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes… ▽ More

    Submitted 3 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: version 2 post peer review Forensic Science International Digital Investigation

    Report number: Volume 48, 301675

    Journal ref: Forensic Science International: Digital Investigation, 2024

  6. arXiv:2309.05537  [pdf

    cs.CR cs.IR cs.NI cs.OS

    D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

    Authors: Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin

    Abstract: The use of the un-indexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is an in-famously dangerous place where all kinds of criminal activities take place [1-2], despite advances in web forensics techniques, tools, and methodologies, few studies have formally tackled the dark and deep web fo… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  7. arXiv:2307.07293  [pdf

    cs.CR cs.MM

    StegoHound: A Novel Multi-Approaches Method for Efficient and Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files

    Authors: Mohamed C. Ghanem, Maider D. Uribarri, Ramzi Djemai, Dipo Dunsin, Istteffanny I. Araujo

    Abstract: Anti-forensics techniques particularly steganography and cryptography have become increasingly pressing issues that affect the current digital forensics practice. This paper advances the automation of hidden evidence extraction in the context of audio files by proposing a novel multi-approaches method which enables the correlation between unprocessed artefacts, indexed and live forensics analysis… ▽ More

    Submitted 10 December, 2023; v1 submitted 14 July, 2023; originally announced July 2023.

    Comments: Journal of Information Security and Cybercrimes Research- Post Review V3.1

    Report number: ol. 6, no. 2, pp. 89-104

    Journal ref: JISCR 2023