به جمع مشترکان مگیران بپیوندید!

تنها با پرداخت 70 هزارتومان حق اشتراک سالانه به متن مقالات دسترسی داشته باشید و 100 مقاله را بدون هزینه دیگری دریافت کنید.

برای پرداخت حق اشتراک اگر عضو هستید وارد شوید در غیر این صورت حساب کاربری جدید ایجاد کنید

عضویت
فهرست مطالب نویسنده:

behrouz tork ladani

  • Navid Shirmohammadi, Behrouz Tork Ladani *
    As cyber threats grow increasingly sophisticated, the importance of security training as an effective means of prevention will become even more critical. Cyber Range (CR) is a platform for creating cyber training programs using virtualization and simulation technologies to create a realistic training environment. The main challenge for utilizing a CR is the specialized human resources required to design and maintain training sessions. To tackle this challenge, several high-level languages, known as Scenario Description Languages (SDLs), have been developed to enable the specification of training environments as models. These models can then be automatically transformed into deployment artifacts. Our studies showed that the existing SDLs could not address requirements when designing complex scenarios where multiple trainees should collaborate to reach a desired goal through various acceptable solutions. We present the Collaborative Security Training SDL (CST-SDL) for creating multi-trainee and multi-solution scenarios. CST-SDL uses an acyclic directional graph for specifying the scenario's solution routes and allows defining trainees with unique tasks, goals, and solution routes during the training session. To evaluate the CST-SDL's capabilities, we have implemented and integrated it into the KYPO cyber range.
    Keywords: Cyber Range, Cybersecurity, Training, Model-Driven Engineering, Scenario Description Language
  • فرنوش کریمی، بهروز ترک لادانی*، بهروز شاهقلی قهفرخی

    با افزایش شدت تهدیدات امنیت سایبری در سطح جهانی، نیاز به آموزش متخصصان امنیتی اهمیت بیشتری یافته است. برنامه های آموزشی به همراه آزمایشگاه ها و انجام تمرین های امنیت سایبری، نقش اساسی در بهبود مهارت های آفندی و پدافندی ایفا می کنند. انجام این تمرین ها، به ویژه در شبکه های عملیاتی که مناسب آزمایش حملات سایبری نیستند، از اهمیت ویژه ای برخوردارند. میدان سایبری، بستر مناسبی برای این تمرین ها فراهم می کنند. یکی از چالش های اساسی در آموزش امنیت سایبری، تطابق برنامه های آموزشی با سطوح مختلف مهارت آموزان است. یادگیری تطبیقی با استفاده از هوش مصنوعی و سیستم های پیشنهاددهنده می تواند راه حل مناسبی برای ارائه آموزش شخصی سازی شده باشد. در این پژوهش، با تمرکز بر میدان سایبری کایپو، به بررسی امکان جایگزینی یا تکمیل نقش مربی با یک عامل پیشنهاد دهنده مبتنی بر هوش مصنوعی پرداخته شده است. هدف از این تحقیق، کاهش نیاز به دخالت انسانی و افزایش کارایی فرآیند آموزش است. بدین منظور، از اطلاعات جمع آوری شده در میدان سایبری کایپو که توسط دانشگاه ماساریک توسعه یافته، استفاده شده و مدل های مختلف یادگیری ماشین به کار گرفته شده است تا فرآیند آموزش به صورت خودکار و بهینه انجام شود. نتایج این پژوهش نشان می دهد که استفاده از هوش مصنوعی می تواند به بهبود عملکرد سیستم های آموزشی و کاهش زمان ارزیابی کمک کند.

    کلید واژگان: یادگیری تطبیقی، آموزش امنیت سایبری، میدان سایبری کایپو، یادگیری ماشین، یادگیری تقویتی
    Farnoosh Karimi, Behrouz Tork Ladani*, Behrouz Shahgholi Ghahfarokhi

    As the intensity of global cybersecurity threats continues to rise, the need for training security professionals has gained greater significance. Educational programs, complemented by laboratories and the execution of cybersecurity exercises, play a fundamental role in enhancing both offensive and defensive capabilities. The execution of such exercises is particularly crucial in operational networks, where testing cyberattacks may not be feasible. Cyber ranges offer an appropriate platform for conducting these exercises. A primary challenge in cybersecurity education is aligning training programs with the diverse skill levels of learners. Adaptive learning, powered by artificial intelligence and recommendation systems, can provide an effective solution for delivering personalized instruction. This study focuses on the KYPO Cyber Range to examine the potential of substituting or augmenting the role of the instructor with an AI-based recommendation agent. The objective of this research is to minimize human intervention and improve the efficiency of the training process. To this end, data collected from the KYPO Cyber Range, developed by Masaryk University, has been utilized, and various machine learning models have been applied to automate and optimize the training process. The results of this research indicate that the integration of artificial intelligence can enhance the performance of educational systems and reduce evaluation time.

    Keywords: Adaptive Learning, Learning Cybersecurity, KYPO Cyber Range, Machine Learning, Reinforcement Learning
  • Milad Radnejad, Zahra Zojaji *, Behrouz Tork Ladani
    Social networks have become a central part of our lives these days and have real effects on the world's events. However, social networks greatly boost spreading misinformation and rumors that are becoming more and more dangerous each day. As fighting rumors first requires detecting them, several researchers tried to propose novel approaches for automatic early detection of rumors. However, most of them rely on handcrafted content features which makes them prone to deception and threats the adaptability of the model. Furthermore, a great deal of work have concentrated on event-level rumor detection while it faces early detection with serious challenges. There are also deficiencies in proposed methods in terms of time and resource complexity. This study proposes a deep learning approach to automate the detection of rumors on Twitter. The proposed method relies on automatically extracted features through word and sentence embeddings along with profile and network-based features. It then uses Recurrent Neural Networks (RNN) leveraging Gated Recurrent Units (GRU) for detecting the veracity of a tweet. The proposed method also improves time efficiency. The achieved experimental evaluation results on RumorEval2019 dataset demonstrate that the proposed method outperforms other rival models on the same dataset in terms of both performance and time complexity. By the way, the proposed method is more resilient to deception by avoiding the use of handcrafted content features and leveraging features that are out of the control of the user.
    Keywords: Deception, deep Learning, Rumor detection, Social network, twitter
  • Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani *
    Sensitive methods are those that are commonly used by Android malware to perform malicious behavior. These methods may be either evasion or malicious payload methods. Although there are several approaches to handle these methods for performing effective dynamic malware analysis, but generally most of them are based on a manually created list. However, the performance shown by the selected approaches is dependent on completeness of the manually created list that is not almost a complete and up-to-date one. Missing some sensitive methods causes to degrade the overall performance and affects the effectiveness of analyzing Android malware.In this paper, we propose a machine learning approach to predict new sensitive methods that might be used in Android malware. We use a manually collected training dataset to train two classifiers: a classifier for detecting the sensitivity nature of the Android methods, and another classifier to categorize the detected sensitive methods into predefined categories. We applied the proposed approach to a large number of methods extracted from Android API 27. The proposed approach is able to predict hundreds of sensitive methods with accuracy of 90.5% for the first classifier and 87.4% for the second classifier. To evaluate the proposed approach, we built a new list of the detected sensitive methods and used it in a number of tools to perform dynamic malware analysis. The proposed model found various sensitive methods that were not considered before by any other tools. Hence, the effectiveness of these tools in performing dynamic analysis are increased.
    Keywords: Sensitive methods, Evasion methods, Payload methods, Dynamic analysis, Machine Learning
  • Mojgan Askarizade, Samad Najafi, Behrouz Tork Ladani *
    Todays, although social networks are used for extensive information sharing, spreading rumors has also been accelerated and become a serious problem. Rumor control can be accomplished through either hard or soft control strategies. The former uses depriving actions like blocking rumor spreaders, while the latter tries to persuade people personally avoiding rumor propagation by increasing their knowledge and awareness. Although there are some proposals for rumor control in social networks, suitable frameworks for modeling and analysis of rumor control strategies and methods with proper consideration of the effective factors is still a need. This study introduces a rumor propagation model based on evolutionary game theory along with a number of soft and hard rumor control methods. Using the proposed model, we simulate and analyze rumor control methods considering different environmental, personal, and content-related factors that may influence people's decisions about rumors. The simulation is conducted on a Twitter graph according to various society conditions. One of the findings is that the soft rumor control strategy is generally more effective than the hard rumor control strategy. The proposed model itself and the conducted analysis can be adopted for developing and deploying effective rumor control mechanisms in social network systems.
    Keywords: Evolutionary Game Theory, Rumor spreading, Rumor control, Social network
  • Amirhosein Sayyadabdi, Behrouz Tork Ladani *, Bahman Zamani
    Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android security mechanism; hence, a failure in the design of APS can potentially lead to vulnerabilities that grant unauthorized access to resources by malicious applications. In this paper, we present a formal approach for modeling and verifying the security properties of APS. We demonstrate the usability of the proposed approach by showcasing the detection of a well-knownvulnerability found in Android’s custom permissions.
    Keywords: Android Security, Formal Methods, Verification
  • Afshin Karampour *, Maede Ashouri-Talouki, Behrouz Tork Ladani
    Smart grids using information technology (IT) and communication networks control smart home appliances to reduce costs and increase reliability and transparency. Preserving the privacy of the user data is one of the biggest challenges in smart grid research; by disclosing user-related data, an internal or external adversary can understand the habits and behavior of the users. A solution to address this challenge is, however, a data aggregation mechanism in which the aggregated data of all of the users in a residential area. The security and efficiency of the data aggregation approach are important. The drawback of the previous works is leaking fine-grained user data or the high computation and communication overhead. In this paper, we present an efficient privacy-preserving data-aggregation protocol, called PPDA, based on the Elliptic Curve Cryptography (ECC) and Anonymous Veto network protocol. The PPDA protocol aggregates metering data efficiently and securely so that it becomes applicable for resource-constraint metering devices. We also present an improved multi-cycle proposal of PPDA, called MC-PPDA. In the improved approach, the system initialization step runs only at the first cycle of the protocol which increases the efficiency of the protocol. Evaluation results show that the proposed approaches preserve the privacy of the fine-grained user data against an internal and external adversary; the improved multi-cycle approach is also secure against collusion. Compared to the previous approaches, the proposed approaches incur less computation and communication overhead.
    Keywords: smart grid, Smart Meter, data aggregation, Privacy-Preserving, Elliptic Curve Cryptography, AV-Net Mask
  • مجید ایرانپور مبارکه*، بهروز ترک لادانی

    امروزه تشخیص حملات سطح مرورگر چالشی جدی برای حفاظت از اطلاعات کاربران محسوب می شود. حمله فردی در مرورگر (MitB ،(نوع مهمی از این حملات است که با استفاده از تروجان ها می تواند منجر به تغییر در محتویات صفحه وب، مداخله در ترافیک شبکه، سرقت نشست و سرقت اطلاعات کاربر شود. در این مقاله ابزاری کارآمد برای شناسایی بلادرنگ حملات MitB از طریق تحلیل پویای صفحات وب بر اساس توصیف الگوی حملات ارایه می شود. مزیت ابزار پیشنهادی نسبت به روش های مشابه این است که محدود به شناسایی یک یا چند حمله خاص نیست و کد روش شناسایی در ابزار تعبیه نشده است، بلکه الگوی حملات مختلف به صورت جداگانه توصیف می شود. جهت ارزیابی ابزار ارایه شده، دو سرویس وب آسیب پذیر ارایه شده توسط OWASP که دارای طیف وسیعی از آسیب پذیری های شناخته شده هستند، به همراه چارچوب آزمون نفوذپذیری BeEF مورد استفاده قرار گرفت و مجموعه ای از حملات MitB به صورت عملی پیاده سازی و توسط ابزار مورد ارزیابی قرار گرفت. همین آزمایش ها با استفاده از سه ابزار مشابه دیگر نیز عینا انجام و با ابزار ارایه شده مقایسه شد. علاوه بر برتری ابزار ارایه شده از جهت استقلال توصیف حملات از خود ابزار، نتایج حاصل نشان دهنده بهتر بودن معیارهای دقت و بازخوانی تشخیص آن نسبت به ابزارهای مشابه است.

    کلید واژگان: حمله فردی در مرورگر، بدافزار، تشخیص بدافزار، تحلیل پویا
    Majid Iranpour Mobarakeh*, Behrouz Tork Ladani

    Detection of browser attacks is considered a serious challenge in today’s web applications. Man in the Browser (MitB) attack is an important type of these attacks that can lead to changes in web page contents, interference in network traffic, session hijacking, and user information theft by using Trojans. In this paper, an efficient tool for real-time detection of MitB attacks through dynamic analysis of web pages based on the description of attack patterns is presented. The advantage of the proposed tool is that it is not limited to identifying one or more specific attacks and the identification method code is not embedded in the tool, but the patterns of different attacks are specified separately. In order to evaluate the presented tool, two vulnerable web services provided by OWASP, which have a wide range of known vulnerabilities, were used along with the BeEF penetration test framework, and a set of MitB attacks were practically implemented and evaluated by the tool. The same tests were performed using three other similar tools and compared with the developed tool. In addition to the superiority of the presented tool in terms of the independence of attack descriptions from the tool itself, the results show that the accuracy and readability of its diagnosis are better than similar tools.

    Keywords: MitB attacks, malware, malware detection, dynamic analysis
  • Seyed Behnam Andarzian, Behrouz Tork Ladani *
    Most of the current research on static analysis of Android applications for security vetting either work on Java source code or the Dalvik bytecode. Nevertheless, Android allows developers to use C or C++ code in their programs that is compiled into various binary architectures. Moreover, Java and the native code components (C or C++) can collaborate with each other using Java Native Interface. Recent research shows that native codes are frequently used in both benign and malicious Android applications. Most of the present Android static analysis tools avert considering native codes in their analysis and applied trivial models for their data-flow analysis. As we know only the open source JN-SAF tool has tried to solve this issue statically. However, there are still challenges like libC functions and multi-threading in native codes that we want to address in this work. We presented SANT as an extension of JN-SAF for supporting Static Analysis of Native Threads. We considered modeling libC functions in our data-flow analysis to have a more precise analysis when dealing with security vetting of native codes. We also used control flow and data dependence graphs in SANT to handle multiple concurrent threads and find implicit data-flow between them. Our experiments show that the conducted improvements outperforms JN-SAF in real-world benchmark applications.
    Keywords: Android Security, information leakage, Mobile Security, Static analysis
  • Hayyan Hasan, Behrouz Tork Ladani *, Bahman Zamani
    Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic analysis of Android malware as well. Monkey provides high code coverage and yet high speed in generating events. However, in the case of malware analysis, Monkey suffers from several limitations. It only considers UI events but no system events, and because of random behavior in generating UI events, it may lose dropping the connectivity of the test environment during the analysis process. Moreover, it provides no defense against malware evasion techniques. In this paper, we try to enhance Monkey by reducing its limitations while preserving its advantages. The proposed approach has been implemented as an extended version of Monkey, named Curious-Monkey. Curious-Monkey provides facilities for handling system events, handling evasion techniques, and keeping the test environment's connectivity up during the analysis process. We conducted many experiments to evaluate the effectiveness of the proposed tool regarding two important criteria in dynamic malware analysis: the ability to trigger malicious payloads and the code coverage. In the evaluation process, we used the Evadroid benchmark and the AMD malware dataset. Moreover, we compared Curious-Monkey with Monkey and Ares tools. The results show that the Curious-Monkey provides better results in case of triggering malicious payloads, as well as better code coverage.
    Keywords: Curious-Monkey, Monkey, Android, Event Generator, Android Malware, Dynamic analysis
  • Fereidoun Moradi, Hamid Mala, Behrouz Tork Ladani, Fariba Moradi
    Design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many protocols have been published in the last decade. In 2013, Wei and Zhang proposed a new lightweight RFID authentication protocol that conforms to the EPC-C1G2 standard and claimed that the protocol would be immune against all known attacks on RFID systems. In this paper, we consider the security of this protocol and show that it cannot provide secure authentication for RFID users. An attacker, by following our suggested approach, will be able to impersonate server/reader, and destroy synchronization between the back-end server and the tag. Finally, we enhance this protocol, and by using formal and informal security analysis we show that the enhanced protocol strongly inhibits the security flaws of its predecessor.
    Keywords: RFID, EPC-C1G2 Standard, Mutual Authentication, Impersonation, De-Synchronization
  • Safieh Ghasemi, Behrouz Tork Ladani, Simin Ghasemi
    An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behaviour, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. GossipTrust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on the concept of gossip. Despite its important contribution, this algorithm has deficiencies especially with high number of nodes that leads to high execution time and low accuracy in the results. In this paper, a grouped Gossip based Reputation Aggregation (GGRA) algorithm is proposed. In GGRA, GossipTrust is executed in each group between group members and between groups instead of executing in the whole network. Due to the reduction in the number of nodes and using strongly connected graph instead of a weakly one, gossip algorithm in GGRA is executed quickly. With grouping, not only reputation aggregation is expected to be more scalable, but also because of the decrement in the number of errors of the gossiped communication, the results get more accurate. The evaluation of the proposed algorithm and its comparison with GossipTrust confirms the expected results.
  • Mansooreh Ezhei, Behrouz Tork Ladani
    Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, have led to the adoption of trust concept. One of the methods of making trust in such environments is to use long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both parties of such trust relationship will face big problems of collecting data and forming reasonable and reliable beliefs. Considering the concept of “group” in modeling trust is a way to overcome the above mentioned problems. Since,group-based trust is more suited with the nature of trust in new virtual environments. In this paper a new trust model called “GTrust” is proposed in which trust is considered as a collective and shared feature of all group members. Therefore, group membership is used as the judgment criteria regarding a person’s expected behavior and how he can be a trustee. GTrust is based on Metagraphs which is a graphical data structure for representing a collection of directed set-to-set mappings. We show that by using GTrust, large trust spaces between unknown individuals can be shaped effectively. The proposed model not only offers a better description of human sense of trust when considering communities, but also provides the setting for evaluating the trust of individuals whom we do not know, and therefore provides an extended evaluation domain.
  • Zahra Derakhshandeh, Behrouz Tork Ladani
    Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new independent formal model called Constrained Policy Graph (CPG) for specification of ACPs and their composition as well as verification of conflict or incompatibility among the ACPs is represented. It is shown how CPG can be used in modeling and verification of web service composition ACPs. Also the application of CPG for modeling policies in BPEL processes -as the most common composition method for web services- is illustrated.
    Keywords: Access Control Policy (ACP), Verification, Web Service Composition, BPEL, Constrained Policy Graph (CPG)
سامانه نویسندگان
  • دکتر بهروز ترک لادنی
    دکتر بهروز ترک لادنی
    استاد تمام دانشکده مهندسی کامپیوتر، دانشگاه اصفهان، اصفهان، ایران
اطلاعات نویسنده(گان) توسط ایشان ثبت و تکمیل شده‌است. برای مشاهده مشخصات و فهرست همه مطالب، صفحه رزومه ایشان را ببینید.
بدانید!
  • در این صفحه نام مورد نظر در اسامی نویسندگان مقالات جستجو می‌شود. ممکن است نتایج شامل مطالب نویسندگان هم نام و حتی در رشته‌های مختلف باشد.
  • همه مقالات ترجمه فارسی یا انگلیسی ندارند پس ممکن است مقالاتی باشند که نام نویسنده مورد نظر شما به صورت معادل فارسی یا انگلیسی آن درج شده باشد. در صفحه جستجوی پیشرفته می‌توانید همزمان نام فارسی و انگلیسی نویسنده را درج نمایید.
  • در صورتی که می‌خواهید جستجو را با شرایط متفاوت تکرار کنید به صفحه جستجوی پیشرفته مطالب نشریات مراجعه کنید.
درخواست پشتیبانی - گزارش اشکال