Skip to main content

Showing 1–7 of 7 results for author: Ouazzane, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.15028  [pdf

    cs.CR cs.AI

    A Novel Reinforcement Learning Model for Post-Incident Malware Investigations

    Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: This Research proposes a Novel Reinforcement Learning (RL) model to optimise malware forensics investigation during cyber incident response. It aims to improve forensic investigation efficiency by reducing false negatives and adapting current practices to evolving malware signatures. The proposed RL framework leverages techniques such as Q-learning and the Markov Decision Process (MDP) to train th… ▽ More

    Submitted 12 January, 2025; v1 submitted 19 October, 2024; originally announced October 2024.

    Comments: v3, 8 pages. arXiv admin note: substantial text overlap with arXiv:2408.01999

  2. arXiv:2408.01999  [pdf

    cs.CR cs.AI cs.ET

    Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response

    Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: This research focused on enhancing post-incident malware forensic investigation using reinforcement learning RL. We proposed an advanced MDP post incident malware forensics investigation model and framework to expedite post incident forensics. We then implement our RL Malware Investigation Model based on structured MDP within the proposed framework. To identify malware artefacts, the RL agent acqu… ▽ More

    Submitted 7 January, 2025; v1 submitted 4 August, 2024; originally announced August 2024.

    Comments: 21 pages

  3. arXiv:2312.01219  [pdf

    cs.CR cs.DC

    A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response

    Authors: Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem

    Abstract: Intrusion detection systems perform post-compromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analysed and triaged by security analysts. This process is largely manual, tedious and time-consuming. Alert correlation is a technique that tries to reduce the number of intrusion… ▽ More

    Submitted 18 January, 2025; v1 submitted 2 December, 2023; originally announced December 2023.

    Comments: version 4

  4. A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response

    Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane, Vassil Vassilev

    Abstract: In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes… ▽ More

    Submitted 3 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: version 2 post peer review Forensic Science International Digital Investigation

    Report number: Volume 48, 301675

    Journal ref: Forensic Science International: Digital Investigation, 2024

  5. arXiv:2309.05537  [pdf

    cs.CR cs.IR cs.NI cs.OS

    D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

    Authors: Mohamed Chahine Ghanem, Patrick Mulvihill, Karim Ouazzane, Ramzi Djemai, Dipo Dunsin

    Abstract: The use of the un-indexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is an in-famously dangerous place where all kinds of criminal activities take place [1-2], despite advances in web forensics techniques, tools, and methodologies, few studies have formally tackled the dark and deep web fo… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  6. Challenges towards Building an effective Cyber Security Operations Centre

    Authors: Cyril Onwubiko, Karim Ouazzane

    Abstract: The increasing dependency of modern society on IT systems and infrastructures for essential services (e.g. internet banking, vehicular network, health-IT, etc.) coupled with the growing number of cyber incidents and security vulnerabilities have made Cyber Security Operations Centre (CSOC) undoubtedly vital. As such security operations monitoring is now an integral part of most business operations… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: 20 pages, 3 figures

    Journal ref: International Journal On Cyber Situational Awareness (IJCSA), Vol. 4, No.1, 2019, ISSN: 2057-2182, https://c-mric.com/100124

  7. arXiv:2202.02537  [pdf

    cs.CR cs.LG cs.SI

    Multidimensional Cybersecurity Framework for Strategic Foresight

    Authors: Cyril Onwubiko, Karim Ouazzane

    Abstract: Cybersecurity is now at the forefront of most organisational digital transformative agendas and National economic, social and political programmes. Hence its impact to society can no longer be seen to be one dimensional. The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations. And the recent awakening for social and ethical transparency in… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

    Comments: 31 pages, 7 figures

    Journal ref: Intl. Journal on Cyber Situational Awareness, Vol. 6, No. 1, 2021