SlideShare a Scribd company logo
Application of Data Mining in
Security: Trends and Research
Directions
Ja’far Alqatawna
University of Jordan
J.Alqatawna@ju.edu.jo
Presentation at University of Granada
CITIC-UGR
About me
Ja’far Alqatawna
– Education:
• PhD in E-Business Security, SHU, UK.
• MSc. in Information & communication Systems Security, The Royal Institute of
Technology (KTH), Sweden.
• BEng. In Computer Engineering, Mu’tah, Jordan.
– Work experience
• Associate Professor at KASIT and head of BIT department at University of Jordan.
• Program coordinator: MSc. In Web Intelligence.
• Worked as Assistant Technical Director, Computer Center, University of Jordan(UJ).
• Worked for the Swedish Institute of computer Science at the Security Policy and Trust
Lab. Sweden.
• Co-Founder of Jordan Information Security & Digital Forensics Reacher Group.
• Member of IEEE.
– Contact: J.Alqatawna@ju.edu.jo
Teaching Experience
• BSc. Level:
– e-Business, e-Business Security, Web
Programming.
• MSc.
– Info Security, Secure Software Development(MSc.
IS Security and digital criminology).
– Web Security(MSc. Web Intelligence).
Agenda
• Security observations.
• Security statistics.
• Insecurity: contributed factors.
• Why the interest in Data Mining.
• Application of Data Mining in Security.
• Ongoing Research Projects
Security: What can be observed over the last five
decades?
• DES & 3DES encryption (1974-1997).
• MD5 hashing (1991-1996).
• Very advanced encryption algorithms and
protocols(AES, RSA, SSL,…).
• More and more of perimeter defense (firewall, Anti-
Viruses, Authentication, Access Controls…).
However, security incidents are increasing
significantly!!!!
Security: What do statistics really tell us?
for Microsoft Applications
Source: http://www.cvedetails.com/
What About Software Developers!!!!!!
Insecurity: Contributed factors
New technological innovations
– Web 2.0
– IoT
– Mobile App.
– Cloud
• Connectivity
• Extensibility
• Complexity
• Instant user generated
contents/applications
• Security as an afterthought
The Golden rule:
A 100% Secure system is not exist!
SHODAN: Internet of Things Search Engine
Why the interest in Data Mining
• Security is pervasive and perimeters are dissolving:
– Cloud
– Mobile/BYOD
– OSN
– E-Business
• Data Mining is powerful.
– Classification
– Clustering
– Prediction
– Contextual intelligence
– Big Data analytics
– Long-term correlation
Application of Data Mining in
Security
• Huge amount of data is produced over the cyberspace.
• Remarkable increase in the rate of various types of
cyber-attacks.
• DM can contribute to several security areas such as:
1. Behavioral Biometrics & Continuous Authentication.
2. Malicious Spam detection.
3. Cybercrimes and Botnet detection.
4. Insider misuse detection
5. Sybil attacks
6. Adaptive security
Behavioral Biometrics &
Continuous Authentication
• Identification
• Verification
• Authentication
• Authorization
Methods of Authentication:
 Something you Know.
 Something you have.
 Where you are.
 Something you are.
 Something you do.
Area #1: A Biometric Framework for Intrusion
Detection over Social Networks
Published work:
Alqatawna, J.: An adaptive multimodal biometric framework for intrusion detection
in online social networks. IJCSNS International Journal of Computer Science and
Network Security 15(4), 19–25 (2015)
• OSN platforms:
– Profile based service
– Extremely interactive and generate substantial
amount information.
– Subject to several security and privacy threats.
User session
Login Logout
StaticAuthentication
Authentication
function
Something user knows:
password,
PIN Code,
or secret
question
Window of Attack
Password
guessing
Phishing
Attack
Session
Hijacking
Machine
Hijacking
Characteristics of the proposed
framework
• Defense-in-depth:
1. A typical static authentication function at the
login stage.
2. A set of continuous authentication functions
during the user's active session:
I. Keystroke dynamics
II. Moues Dynamics
III. Touch Screen Dynamics
3. Profile-based Anomaly Detection.
User session
Login Logout
Static
Authentication
Authentication
function
Something user
knows:
password,
PIN Code,
or secret
question
Continuous
Authentication
Continuous Authentication
Login Logout
Static Authentication
Authentication
function
Something user
knows:
password,
PIN Code,
or secret
question
Set of
Continuous authentication
functions
user session
User activities over the OSN
Analyze
Detect
Continuous Authentication & Anomaly
Detection
Login Logout
Static Authentication
Authentication
function
Something
user knows:
password,
PIN Code,
or secret
question
user session
User activities over the OSN
Profile-Based
AnomalyDetector
Device
Detector
Keystroke
Dynamics
Mouse
Dynamics
Touch
Dynamics
Response
The Way Forward
• Prototype/implementation of the framework
components.
• Open Source OSN platform to apply these
components.
• Ground-truth Dataset.
• Effective data extraction and classification
techniques.
Area #2: Malicious Spam detection
Published work:
Alqatawna, J. , Faris, H. , Jaradat, K. , Al-Zewairi, M. and Adwan, O. (2015) Improving
Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in
Imbalance Data Distribution. International Journal of Communications, Network and System
Sciences, 8, 118-129. doi: 10.4236/ijcns.2015.85014.
Ongoing projects:
Project 1: Malicious Spam Detection in Email Systems of Educational Institutes.
Project 2: Spammers Detection over Online Social Networks Based on Public Attributes: The
case of twitter.
Project 1: Malicious Spam Detection in Email Systems of
Educational Institutes.
• 10,000 spam emails have been collected from
University of Jordan and are being analyzed
based on the following methodology:
– Social Engineering techniques employed by
attackers(topics, impersonation,
obfuscation,…etc.)
– Attack vectors: links, doc, exe, pdf, embedded
code.
– Malware families: adware, bot, ransomware,
rootkit,…etc.
Project 1: Malicious Spam Detection in Email Systems of
Educational Institutes…NEXT STEP
• Constructing a complete dataset (Spam and
Ham) from Educational context.
• Investigating Malicious spam features related
to the Ed. Context.
• Build effective classification method.
Project 2: Spammers Detection over Online Social Networks
Based on Public Attributes: The case of twitter.
• In OSNs phishing attack is four times more
effective than blind attempts1.
• Primary Attack vector: Spam messages with
malicious links.
• Many of the profile attributes are public and
can be extracted using TwitteR.
• MSc student is working on feature extraction.
1 Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks.
Internet Computing, IEEE, 15(4), 56-6
Feature extraction…
1. Suspicious Words : such as (Diet, Click here, Health, Make Money, Give Me, Vote , Free, etc.)
2. Default Image : Default image doesn’t changed for a while.
3. % Links in tweets: High Percentage links (URL) per tweet
4. Following to Followers ratio: follows more than being followed.
5. Repeated Words : High Percentage duplicate Words per tweet.
6. Tweet to response ratio: tweets more than responding to users comments.
7. Time between tweets: Tweets at the regular time internal.
8. Description – Tweets inconsistency: Profile description different form tweets topics.
9. Divers interest: Following or interest in various type of people.
10. Number of Tweet per Day : Number of tweet per day.
Another Area
• Botnet detection.
• Intrusion detection.
• Insider attacks and misuse detection.
• Sybil detection.
• Adaptive Security.
Thank you for listening
?
Thank You
Visit Jordan

More Related Content

What's hot

C3602021025
C3602021025C3602021025
C3602021025
ijceronline
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
OWASP Delhi
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
Infocyte
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
Damir Delija
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
IJCSIS Research Publications
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Digit Oktavianto
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
IAEME Publication
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
IJERA Editor
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
Damir Delija
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Anomaly Detection for Security
Anomaly Detection for SecurityAnomaly Detection for Security
Anomaly Detection for Security
Cody Rioux
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec
 
Presentation Undergraduate Project
Presentation Undergraduate ProjectPresentation Undergraduate Project
Presentation Undergraduate Project
Cevdet Basaran
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
ijceronline
 

What's hot (20)

C3602021025
C3602021025C3602021025
C3602021025
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Anomaly Detection for Security
Anomaly Detection for SecurityAnomaly Detection for Security
Anomaly Detection for Security
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 
Presentation Undergraduate Project
Presentation Undergraduate ProjectPresentation Undergraduate Project
Presentation Undergraduate Project
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 

Viewers also liked

Towards Automatic StarCraft Strategy Generation Using Genetic Programming
Towards Automatic StarCraft Strategy Generation Using Genetic ProgrammingTowards Automatic StarCraft Strategy Generation Using Genetic Programming
Towards Automatic StarCraft Strategy Generation Using Genetic Programming
Pablo García Sánchez
 
This was a triumph: Evolving intelligent bots for videogames. And for Science.
This was a triumph: Evolving intelligent bots for videogames. And for Science. This was a triumph: Evolving intelligent bots for videogames. And for Science.
This was a triumph: Evolving intelligent bots for videogames. And for Science.
Pablo García Sánchez
 
Mathematical support for preventive maintenance periodicity optimization of r...
Mathematical support for preventive maintenance periodicity optimization of r...Mathematical support for preventive maintenance periodicity optimization of r...
Mathematical support for preventive maintenance periodicity optimization of r...
Alexander Lyubchenko
 
Benchmarking languages for evolutionary algorithms
Benchmarking languages for evolutionary algorithmsBenchmarking languages for evolutionary algorithms
Benchmarking languages for evolutionary algorithms
Juan J. Merelo
 
Evolutionary Deckbuilding in Hearthstone
Evolutionary Deckbuilding in HearthstoneEvolutionary Deckbuilding in Hearthstone
Evolutionary Deckbuilding in Hearthstone
Pablo García Sánchez
 
Benchmarking languages for evolutionary computation
Benchmarking languages for evolutionary computationBenchmarking languages for evolutionary computation
Benchmarking languages for evolutionary computation
Juan J. Merelo
 
MUSES WP5 Final Conclusions
MUSES WP5 Final ConclusionsMUSES WP5 Final Conclusions
MUSES WP5 Final Conclusions
Paloma De Las Cuevas
 
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Antonio Mora
 
Ejemplos de investigación en videojuegos
Ejemplos de investigación en videojuegosEjemplos de investigación en videojuegos
Ejemplos de investigación en videojuegos
Pablo García Sánchez
 
Hackahton smart cities 2016 (Mayo 2016)
Hackahton smart cities 2016 (Mayo 2016)Hackahton smart cities 2016 (Mayo 2016)
Hackahton smart cities 2016 (Mayo 2016)
Pablo García Sánchez
 
Smart city hackathon
Smart city hackathonSmart city hackathon
Smart city hackathon
Carlos Fernández-Basso
 
Open dataday hackathon conclusiones
Open dataday hackathon conclusionesOpen dataday hackathon conclusiones
Open dataday hackathon conclusiones
Pablo García Sánchez
 

Viewers also liked (12)

Towards Automatic StarCraft Strategy Generation Using Genetic Programming
Towards Automatic StarCraft Strategy Generation Using Genetic ProgrammingTowards Automatic StarCraft Strategy Generation Using Genetic Programming
Towards Automatic StarCraft Strategy Generation Using Genetic Programming
 
This was a triumph: Evolving intelligent bots for videogames. And for Science.
This was a triumph: Evolving intelligent bots for videogames. And for Science. This was a triumph: Evolving intelligent bots for videogames. And for Science.
This was a triumph: Evolving intelligent bots for videogames. And for Science.
 
Mathematical support for preventive maintenance periodicity optimization of r...
Mathematical support for preventive maintenance periodicity optimization of r...Mathematical support for preventive maintenance periodicity optimization of r...
Mathematical support for preventive maintenance periodicity optimization of r...
 
Benchmarking languages for evolutionary algorithms
Benchmarking languages for evolutionary algorithmsBenchmarking languages for evolutionary algorithms
Benchmarking languages for evolutionary algorithms
 
Evolutionary Deckbuilding in Hearthstone
Evolutionary Deckbuilding in HearthstoneEvolutionary Deckbuilding in Hearthstone
Evolutionary Deckbuilding in Hearthstone
 
Benchmarking languages for evolutionary computation
Benchmarking languages for evolutionary computationBenchmarking languages for evolutionary computation
Benchmarking languages for evolutionary computation
 
MUSES WP5 Final Conclusions
MUSES WP5 Final ConclusionsMUSES WP5 Final Conclusions
MUSES WP5 Final Conclusions
 
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
 
Ejemplos de investigación en videojuegos
Ejemplos de investigación en videojuegosEjemplos de investigación en videojuegos
Ejemplos de investigación en videojuegos
 
Hackahton smart cities 2016 (Mayo 2016)
Hackahton smart cities 2016 (Mayo 2016)Hackahton smart cities 2016 (Mayo 2016)
Hackahton smart cities 2016 (Mayo 2016)
 
Smart city hackathon
Smart city hackathonSmart city hackathon
Smart city hackathon
 
Open dataday hackathon conclusiones
Open dataday hackathon conclusionesOpen dataday hackathon conclusiones
Open dataday hackathon conclusiones
 

Similar to Data mining in security: Ja'far Alqatawna

Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
Clinton DSouza
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
BeyondTrust
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
AvinantaTarigan
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AI
Keita Broadwater
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Skycure
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
Ahmed Banafa
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
Marc Crudgington, MBA
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
Kabul Education University
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
99X Technology
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
Nirosh Jayaratnam
 
Fully Integrated Defense Operation
Fully Integrated Defense OperationFully Integrated Defense Operation
Fully Integrated Defense Operation
Rob Fry
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 

Similar to Data mining in security: Ja'far Alqatawna (20)

Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AI
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
 
Fully Integrated Defense Operation
Fully Integrated Defense OperationFully Integrated Defense Operation
Fully Integrated Defense Operation
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 

Recently uploaded

How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
NABLAS株式会社
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
oaxefes
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
inaya7568
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
slg6lamcq
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
asyed10
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 

Recently uploaded (20)

How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
一比一原版美国帕森斯设计学院毕业证(parsons毕业证书)如何办理
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 

Data mining in security: Ja'far Alqatawna

  • 1. Application of Data Mining in Security: Trends and Research Directions Ja’far Alqatawna University of Jordan J.Alqatawna@ju.edu.jo Presentation at University of Granada CITIC-UGR
  • 2. About me Ja’far Alqatawna – Education: • PhD in E-Business Security, SHU, UK. • MSc. in Information & communication Systems Security, The Royal Institute of Technology (KTH), Sweden. • BEng. In Computer Engineering, Mu’tah, Jordan. – Work experience • Associate Professor at KASIT and head of BIT department at University of Jordan. • Program coordinator: MSc. In Web Intelligence. • Worked as Assistant Technical Director, Computer Center, University of Jordan(UJ). • Worked for the Swedish Institute of computer Science at the Security Policy and Trust Lab. Sweden. • Co-Founder of Jordan Information Security & Digital Forensics Reacher Group. • Member of IEEE. – Contact: J.Alqatawna@ju.edu.jo
  • 3. Teaching Experience • BSc. Level: – e-Business, e-Business Security, Web Programming. • MSc. – Info Security, Secure Software Development(MSc. IS Security and digital criminology). – Web Security(MSc. Web Intelligence).
  • 4. Agenda • Security observations. • Security statistics. • Insecurity: contributed factors. • Why the interest in Data Mining. • Application of Data Mining in Security. • Ongoing Research Projects
  • 5. Security: What can be observed over the last five decades? • DES & 3DES encryption (1974-1997). • MD5 hashing (1991-1996). • Very advanced encryption algorithms and protocols(AES, RSA, SSL,…). • More and more of perimeter defense (firewall, Anti- Viruses, Authentication, Access Controls…). However, security incidents are increasing significantly!!!!
  • 6. Security: What do statistics really tell us? for Microsoft Applications Source: http://www.cvedetails.com/ What About Software Developers!!!!!!
  • 7. Insecurity: Contributed factors New technological innovations – Web 2.0 – IoT – Mobile App. – Cloud • Connectivity • Extensibility • Complexity • Instant user generated contents/applications • Security as an afterthought The Golden rule: A 100% Secure system is not exist!
  • 8. SHODAN: Internet of Things Search Engine
  • 9. Why the interest in Data Mining • Security is pervasive and perimeters are dissolving: – Cloud – Mobile/BYOD – OSN – E-Business • Data Mining is powerful. – Classification – Clustering – Prediction – Contextual intelligence – Big Data analytics – Long-term correlation
  • 10. Application of Data Mining in Security • Huge amount of data is produced over the cyberspace. • Remarkable increase in the rate of various types of cyber-attacks. • DM can contribute to several security areas such as: 1. Behavioral Biometrics & Continuous Authentication. 2. Malicious Spam detection. 3. Cybercrimes and Botnet detection. 4. Insider misuse detection 5. Sybil attacks 6. Adaptive security
  • 11. Behavioral Biometrics & Continuous Authentication • Identification • Verification • Authentication • Authorization Methods of Authentication:  Something you Know.  Something you have.  Where you are.  Something you are.  Something you do.
  • 12. Area #1: A Biometric Framework for Intrusion Detection over Social Networks Published work: Alqatawna, J.: An adaptive multimodal biometric framework for intrusion detection in online social networks. IJCSNS International Journal of Computer Science and Network Security 15(4), 19–25 (2015) • OSN platforms: – Profile based service – Extremely interactive and generate substantial amount information. – Subject to several security and privacy threats.
  • 13. User session Login Logout StaticAuthentication Authentication function Something user knows: password, PIN Code, or secret question Window of Attack Password guessing Phishing Attack Session Hijacking Machine Hijacking
  • 14. Characteristics of the proposed framework • Defense-in-depth: 1. A typical static authentication function at the login stage. 2. A set of continuous authentication functions during the user's active session: I. Keystroke dynamics II. Moues Dynamics III. Touch Screen Dynamics 3. Profile-based Anomaly Detection.
  • 15. User session Login Logout Static Authentication Authentication function Something user knows: password, PIN Code, or secret question Continuous Authentication
  • 16. Continuous Authentication Login Logout Static Authentication Authentication function Something user knows: password, PIN Code, or secret question Set of Continuous authentication functions user session User activities over the OSN Analyze Detect
  • 17. Continuous Authentication & Anomaly Detection Login Logout Static Authentication Authentication function Something user knows: password, PIN Code, or secret question user session User activities over the OSN Profile-Based AnomalyDetector Device Detector Keystroke Dynamics Mouse Dynamics Touch Dynamics Response
  • 18. The Way Forward • Prototype/implementation of the framework components. • Open Source OSN platform to apply these components. • Ground-truth Dataset. • Effective data extraction and classification techniques.
  • 19. Area #2: Malicious Spam detection Published work: Alqatawna, J. , Faris, H. , Jaradat, K. , Al-Zewairi, M. and Adwan, O. (2015) Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution. International Journal of Communications, Network and System Sciences, 8, 118-129. doi: 10.4236/ijcns.2015.85014. Ongoing projects: Project 1: Malicious Spam Detection in Email Systems of Educational Institutes. Project 2: Spammers Detection over Online Social Networks Based on Public Attributes: The case of twitter.
  • 20. Project 1: Malicious Spam Detection in Email Systems of Educational Institutes. • 10,000 spam emails have been collected from University of Jordan and are being analyzed based on the following methodology: – Social Engineering techniques employed by attackers(topics, impersonation, obfuscation,…etc.) – Attack vectors: links, doc, exe, pdf, embedded code. – Malware families: adware, bot, ransomware, rootkit,…etc.
  • 21. Project 1: Malicious Spam Detection in Email Systems of Educational Institutes…NEXT STEP • Constructing a complete dataset (Spam and Ham) from Educational context. • Investigating Malicious spam features related to the Ed. Context. • Build effective classification method.
  • 22. Project 2: Spammers Detection over Online Social Networks Based on Public Attributes: The case of twitter. • In OSNs phishing attack is four times more effective than blind attempts1. • Primary Attack vector: Spam messages with malicious links. • Many of the profile attributes are public and can be extracted using TwitteR. • MSc student is working on feature extraction. 1 Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks. Internet Computing, IEEE, 15(4), 56-6
  • 23. Feature extraction… 1. Suspicious Words : such as (Diet, Click here, Health, Make Money, Give Me, Vote , Free, etc.) 2. Default Image : Default image doesn’t changed for a while. 3. % Links in tweets: High Percentage links (URL) per tweet 4. Following to Followers ratio: follows more than being followed. 5. Repeated Words : High Percentage duplicate Words per tweet. 6. Tweet to response ratio: tweets more than responding to users comments. 7. Time between tweets: Tweets at the regular time internal. 8. Description – Tweets inconsistency: Profile description different form tweets topics. 9. Divers interest: Following or interest in various type of people. 10. Number of Tweet per Day : Number of tweet per day.
  • 24. Another Area • Botnet detection. • Intrusion detection. • Insider attacks and misuse detection. • Sybil detection. • Adaptive Security.
  • 25. Thank you for listening ?