SACM - United Kingdom
Permanent URI for this collectionhttps://drepo.sdl.edu.sa/handle/20.500.14154/9667
Browse
3 results
Search Results
Item Restricted Detecting abuse of cloud and public legitimate services as command and control infrastructure using machine learning(Cardiff University, 2024) Al lelah, Turki; Theodorakopoulos, GeorgeThe widespread adoption of Cloud and Public Legitimate Services (CPLS) has inadvertently created new opportunities for cybercriminals to establish hidden and robust command-and-control (C&C) communication infrastructure. This abuse represents a major cybersecurity risk, as it allows malicious traffic to seamlessly disguise itself within normal network activities. Traditional detection systems are proving inadequate in accurately identifying such abuses. Therefore, this thesis is motivated by emphasizing the urgent need for more advanced detection techniques that are capable of identifying the C&C activity hidden within legitimate CPLS traffic. To assess the extent of the cyber threat of abusing CPLS, this thesis presents an ex- tensive Systematic Literature Review (SLR) encompassing academic and industry lit- erature. The review provides a comprehensive categorization of the attack techniques utilized to abuse CPLS as C&C infrastructure. The open problems uncovered through the SLR motivate this thesis to propose a novel Detection System (DS) capable of identifying malware that abuse CPLS as C&C communication channels. Furthermore, to evaluate our system robustness against attempts to evade detection, this thesis intro- duces the Replace Misclassified Parameter (RMCP) adversarial attack. The proposed detection system leverages Artificial Intelligence (AI) techniques, combining static and dynamic malware analysis methods to accurately identify CPLS abuse. The effective- ness of the proposed system is validated through extensive experiments, demonstrating its ability to detect novel and sophisticated attacks that evade traditional security measures. The outcomes of this thesis have significant implications for enhancing the security of cloud environments, contributing valuable knowledge and practical solutions to the field of cloud security.26 0Item Restricted Adaptive Resilience of Intelligent Distributed Applications in the Edge-Cloud Environment(Cardiff University, 2024-04) Almurshed, Osama; Rana, OmerThis thesis navigates the complexities of Internet of Things (IoT) application placement in hybrid fog-cloud environments to improve Quality of Service (QoS) in IoT applications. It investigates the optimal distribution of a Service Function Chain (SFC), the building blocks of an IoT application, across the fog-cloud infrastructure, taking into account the intricate nature of IoT and fog-cloud environments. The primary objectives are to define a platform architecture capable of operating IoT applications efficiently and to model the placement problem comprehensively. These objectives involve detailing the infrastructure's current state, execution requirements, and deployment goals to enable adaptive system management. The research proposes optimal placement methods for IoT applications, aiming to reduce execution time, enhance dependability, and minimise operation costs. It introduces an approach to effectively manage trade-offs through the measurement and analysis of QoS metrics and requires the implementation of specialised scheduling and placement strategies. These strategies employ concurrency to accelerate the planning process and reduce latency, underscoring the need for an algorithm that best corresponds to the specific requirements of the IoT application domain. The study's methodology begins with a comprehensive literature review in the area of IoT application deployment in hybrid fog-cloud environments. The insights gained inform the development of novel solutions that address the identified limitations, ensuring the proposal of robust and efficient solutions.22 0Item Restricted Analysing the Feasibility of Employing Cloud Computing Technology in Construction Industry & Providing A Guideline for Successful Implementation Within the Context of Birmingham, UK(Saudi Digital Library, 2023) Asiri, Khalid; Ugwude, UcheIt is no secret that the construction sector is considered one of the most important sectors around the world and a fundamental driver of countries' economies. Unfortunately, the sector is suffering globally in general and in the United Kingdom in particular as a result of several factors. One of the most important of these factors is the very significant delay compared to other sectors in adopting and using various advanced technologies and innovations, which many practitioners and experts see as the most important solutions to address many of the current negatives and advance the sector to high and unprecedented levels of efficiency and performance. Cloud computing technology is considered one of those important and indispensable technologies towards the transition to the digital world, as it is considered a major enabler for most modern building technologies. The study intends to prove or disprove the feasibility and importance of cloud computing for the construction industry in the United Kingdom, especially in the city of Birmingham, considering understanding and the analysis of all promoters and obstacles to achieving this, whether internal or from the surrounding external environment. Accordingly, a firm methodology can be proposed through which companies can overcome all difficulties throughout the journey of adopting and utilising cloud computing successfully.14 0