9,953 research outputs found

    Longitudinal performance analysis of machine learning based Android malware detectors

    Get PDF
    This paper presents a longitudinal study of the performance of machine learning classifiers for Android malware detection. The study is undertaken using features extracted from Android applications first seen between 2012 and 2016. The aim is to investigate the extent of performance decay over time for various machine learning classifiers trained with static features extracted from date-labelled benign and malware application sets. Using date-labelled apps allows for true mimicking of zero-day testing, thus providing a more realistic view of performance than the conventional methods of evaluation that do not take date of appearance into account. In this study, all the investigated machine learning classifiers showed progressive diminishing performance when tested on sets of samples from a later time period. Overall, it was found that false positive rate (misclassifying benign samples as malicious) increased more substantially compared to the fall in True Positive rate (correct classification of malicious apps) when older models were tested on newer app samples

    A comparative study on cyber power : the United Kingdom, France, and Germany

    Get PDF
    This thesis aims to shed light on the concept of cyber power. Cyber power is a concept that has gained relevance with geopolitical dynamics reaching cyberspace and the increasing intertwining between the physical and digital. In this regard, this concept has been treated through three theoretical lenses: realism, liberalism, and constructivism. Still, constructivist approaches to the concept are sparse and deserve some attention. Thus, the thesis was based on a constructivist perspective, tackling the following research problem: How do states’ perceptions of cybersecurity shape the form of their power projection? Does that confer a new form of power relations, therefore, cyber power as a phenomenon? To answer these questions, the research was developed to be a qualitative comparative study with a case center design. The selection of cases took a regional focus and encompassed conventional geopolitical European powers: the United Kingdom, France, and Germany. As auxiliary methods, the research used qualitative document analysis, practice tracing, and interviews to ensure robust findings. Specifically, the thesis was divided into seven chapters. The first chapter presents the research design and briefly contextualizes the debate over cyber power. The second chapter recalls what power means, going back to Political Sciences' influences on International Relations and the generational development of cyber power theories and indexes. The third, fourth, and fifth chapters focus on the case studies of the United Kingdom, France, and Germany, highlighting their digital mentalities (i.e., self and threat perceptions). The sixth chapter presents the comparison within the cases, pointing to similarities and differences in the concept of cyber power and how perspectives shaped the countries' international positions. The final chapter concludes the research findings and points out that strategic cybersecurity culture plays a relevant role in countries' cyber power perspectives. Even though cyber power was a term only used explicitly by the United Kingdom, it translated into the term sovereignty for France and Germany. In this regard, the idea of power in cyberspace presented itself as broader than just offensive and defensive capabilities, encompassing governance/diplomatic and economic/domestic affairs aspects. Besides, there is an influencing aspect, exposing that cyber power projection would be visible through diplomacy/cyber diplomacy.Esta tese tem como objetivo lançar luz sobre o conceito de poder cibernético. O poder cibernético é um conceito que ganhou relevância com a dinâmica geopolítica que atinge o ciberespaço e o crescente entrelaçamento entre o físico e o digital. Nesse sentido, esse conceito foi tratado por meio de três lentes teóricas: realismo, liberalismo e construtivismo. Ainda assim, as abordagens construtivistas do conceito são escassas e merecem alguma atenção. Dessa forma, a tese se baseou em uma perspectiva construtivista, abordando o seguinte problema: Como as percepções dos Estados sobre segurança cibernética moldam a forma de sua projeção de poder? Isso confere uma nova forma de relações de poder, portanto o poder cibernético como fenômeno? Para responder a estas questões, a pesquisa foi desenvolvida para ser um estudo qualitativo comparativo com um desenho centrado em casos. A seleção dos casos teve um enfoque regional e abrangeu potências geopolíticas europeias convencionais: Reino Unido, França e Alemanha. Como métodos auxiliares, a pesquisa utilizou análise qualitativa de documentos, rastreamento de práticas e entrevistas para garantir resultados robustos. Especificamente, a tese foi dividida em sete capítulos. O primeiro capítulo apresenta o desenho da pesquisa e contextualiza brevemente o debate sobre o poder cibernético. O segundo capítulo relembra o que significa poder, remontando às influências das Ciências Políticas nas Relações Internacionais e ao desenvolvimento geracional de teorias e índices de poder cibernético. O terceiro, quarto e quinto capítulos se concentram nos estudos de caso, do Reino Unido, França e Alemanha, destacando suas mentalidades digitais (ou seja, percepções de si mesmo e de ameaças). O sexto capítulo apresenta a comparação dentro dos casos, apontando semelhanças e diferenças no conceito de poder cibernético e como perspectivas moldaram as posições internacionais dos países. O capítulo final conclui os achados da pesquisa e aponta que a cultura de segurança estratégica desempenha um papel relevante nas perspectivas do poder cibernético dos países. Embora o poder cibernético seja um termo usado apenas explicitamente pelo Reino Unido, ele se traduziu no termo soberania para a França e a Alemanha. Nesse sentido, a ideia de poder no ciberespaço apresentou-se como mais ampla do que apenas capacidades ofensivas e defensivas, englobando aspectos de governança/diplomacia e econômico/ domésticos. Além disso, há um aspecto de influência no conceito, expondo que a projeção do poder cibernético seria visível por meio da diplomacia/ciberdiplomacia

    Strengthening e-crime legislation in the UAE: learning lessons from the UK and the EU

    Get PDF
    The electronic revolution brought with it technological innovations that are now integral to communication, business, commerce and the workings of governments all over the world. It also significantly changed the criminal landscape. Globally it has been estimated that crime conducted via the internet (e-crime) costs more than €290 billion annually. Formulating a robust response to cybercrime in law is a top priority for many countries that presents ongoing challenges. New cybercrime trends and behaviours are constantly emerging, and debates surrounding legal provisions to deal with them by increasing online tracking and surveillance are frequently accompanied by concerns of the rights of citizens to freedom, privacy and confidentiality. This research compares the ways that three different legislative frameworks have been navigating these challenges. Specifically, it examines the legal strategies of the United Arab Emirates (UAE), the United Kingdom (UK) and the European Union (EU). The UAE is comparatively inexperienced in this area, its first law to address e-crime was adopted in 2006, sixteen years after the UK, and so the express purpose of this study is to investigate how e-crime legislation in the UAE can be strengthened. Drawing on a range of theoretical resources supplemented with empirical data, this research seeks to provide a comprehensive account of how key e-crime legislation has evolved in the UAE, the UK and the EU, and to evaluate how effective it has been in tackling cybercrime. Integral to this project is an analysis of some of the past and present controversies related to surveillance, data retention, data protection, privacy, non-disclosure and the public interest. An important corollary of this research is how e-crime legislation is not only aligned with political and economic aims, but when looking at the UAE, the discrete ways that legislation can be circumscribed by cultural, social and religious norms comes into focus

    Governing Cyberspace: Behavior, Power and Diplomacy

    Get PDF
    Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity

    UK cyber security and critical national infrastructure protection

    Get PDF
    This article is intended to aid the UK government in protecting the UK from cyber attacks on its Critical National Infrastructure. With a National Cyber Security Centre now being established and an updated National Cyber Security Strategy due in 2016, it is vital for the UK government to take the right approach. This article seeks to inform this approach by outlining the scope of the problems Britain faces and what action the UK government is taking to combat these threats. In doing so, it offers a series of recommendations designed to further help mitigate these threats, drive up cyber resiliency and aid recovery plans should they be required. It argues that complete engagement and partnership with private sector owner–operators of Critical National Infrastructure are vital to the success of the government's National Cyber Security Strategy. It makes the case that for cyber resiliency to be fully effective, action is needed at national and global levels requiring states and private industry better to comprehend the threat environment and the risks facing Critical National Infrastructure from cyber attacks and those responsible for them. These are problems for all developed and developing states

    The Global Risks Report 2016, 11th Edition

    Get PDF
    Now in its 11th edition, The Global Risks Report 2016 draws attention to ways that global risks could evolve and interact in the next decade. The year 2016 marks a forceful departure from past findings, as the risks about which the Report has been warning over the past decade are starting to manifest themselves in new, sometimes unexpected ways and harm people, institutions and economies. Warming climate is likely to raise this year's temperature to 1° Celsius above the pre-industrial era, 60 million people, equivalent to the world's 24th largest country and largest number in recent history, are forcibly displaced, and crimes in cyberspace cost the global economy an estimated US$445 billion, higher than many economies' national incomes. In this context, the Reportcalls for action to build resilience – the "resilience imperative" – and identifies practical examples of how it could be done.The Report also steps back and explores how emerging global risks and major trends, such as climate change, the rise of cyber dependence and income and wealth disparity are impacting already-strained societies by highlighting three clusters of risks as Risks in Focus. As resilience building is helped by the ability to analyse global risks from the perspective of specific stakeholders, the Report also analyses the significance of global risks to the business community at a regional and country-level

    Artificial intelligence and UK national security: Policy considerations

    Get PDF
    RUSI was commissioned by GCHQ to conduct an independent research study into the use of artificial intelligence (AI) for national security purposes. The aim of this project is to establish an independent evidence base to inform future policy development regarding national security uses of AI. The findings are based on in-depth consultation with stakeholders from across the UK national security community, law enforcement agencies, private sector companies, academic and legal experts, and civil society representatives. This was complemented by a targeted review of existing literature on the topic of AI and national security. The research has found that AI offers numerous opportunities for the UK national security community to improve efficiency and effectiveness of existing processes. AI methods can rapidly derive insights from large, disparate datasets and identify connections that would otherwise go unnoticed by human operators. However, in the context of national security and the powers given to UK intelligence agencies, use of AI could give rise to additional privacy and human rights considerations which would need to be assessed within the existing legal and regulatory framework. For this reason, enhanced policy and guidance is needed to ensure the privacy and human rights implications of national security uses of AI are reviewed on an ongoing basis as new analysis methods are applied to data

    Insurance of Cyber Risks in International Transport

    Get PDF
    The international transport of goods, passengers and luggage is recently facing the threat of cyberattacks. The article is focused on the analysis of the possible cyber risks in the field of the international transport and their management created by the international governmental and non-governmental organisations. The international regulation of the cybersecurity has only recommendatory character and will be subject to future development. That’s the reason why should carriers pay greater attention to all possible cyber security measures. As the instrument of the reduction and mitigation of cyber risks could be used cyber-insurance. The insurance companies are offering insurance cover mainlyon individual base corresponding to the extent of protection required by the policyholder

    Engaging with change: Information and communication technology professionals’ perspectives on change at the mid-point in the UK/EU Brexit process

    Get PDF
    Background Information and Communication Technology (ICT) has been a key agent of change in the 21st century. Given the role of ICT in changing society, this research explores the responses and attitudes to change over time from ICT professionals and ICT academics in dealing with the potentially far reaching political challenge triggered by the UK’s 2016 European Union Referendum and its decision to leave the European Union (Brexit). Whilst the vote was a UK based decision its ramifications have global implications and as such the research was not confined to the UK. This article presents the second phase of the research at the mid-point in the UK/European Union (EU) Brexit process, thus complementing the findings gathered immediately after the Referendum decision. The fundamental question being researched was: What are ICT professionals’ personal and professional perspectives on the change triggered by Brexit in terms of opportunities and threats? Methods and findings Data was collected through a survey launched in March 2018, one year on from the UK’s triggering of Article 50 and marking the mid-point in the two-year Brexit process. The survey replicated the one delivered at the point of the Referendum decision in 2016 with some developments. In addition, two appreciative inquiry focus groups were conducted. The research sought to understand any shifting perspectives on the opportunities and threats that would exist post-Brexit for ICT professionals and academics. 59% of survey participants were negative regarding the Brexit decision. Participants noted the position post-Brexit for the UK, and the remaining 27 EU Member States (EU27), was still very uncertain at this stage. They observed that planned change versus uncertainty provides for very different responses. In spite of the uncertainty, the participants were able to consider and advocate for potential opportunities although these were framed from national perspectives. The opportunities identified within the appreciative inquiry focus groups aligned to those recorded by survey participants with similar themes highlighted. However, the optimum conditions for change have yet to be reached as there is still not an informed position, message and clear leadership with detailed information for the ICT context. Further data will be gathered after the UK exit from the EU, assuming this occurs
    • …
    corecore