submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 4   Issue: Combined Issue 2 & 3

Published In:   April/July 2015

Publication Frequency: Quarterly

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Special Issue on Cybersecurity, Privacy and Trust

Cybersecurity is a global issue with local impact. When cyber security breaches occur, it impacts on society at all levels: Users lose trust in digital platforms, companies lose money, and public institutions are discredited. Over the last years, cybersecurity as a concept has changed significantly and has become a broad area covering for example crime, espionage, privacy invasions, and technical solutions for prevention of attacks on users, individuals as well as industry/companies. Along with this, privacy has become a central element in the discussion mirroring the fact that users have become much more aware of the consequences of disclosure of private data to the online businesses and market. On the supplier side new as old web- and cloudbased services are aware that they are reliant on the trustworthiness they can provide to the customers. Trust is therefore an underlying element central for any detection, managing or prevention technologies being developed within the field of cybersecurity and privacy. This special issue has seven different contributions addressing aspects of the broad area of cybersecurity.

The first contribution, presents a survey of contemporary botnet detection methods that rely on machine learning for identifying botnet network traffic. The paper titled “On the Use of Machine Learning for identifying Botnet Network traffic” by Matija Stevanovic et al, provides a comprehensive overview on the existing scientific work and contributes to the better understanding of capabilities, limitations and opportunities of using machine learning for identifying botnet traffic. The paper initially presents the background on botnet detection with the focus on network-based detection. In addition to that, the authors also present the principles of using MLAs for identifying botnet network traffic. The paper concludes by outlining possibilities for the future development of machine learning-based botnet detection systems.

The second contribution, titled “Practical Attacks on Security and Privacy Through a Low-Cost Android Device” by Greig Paul et al, addresses the practical risks and vulnerabilities in low-cost Android-based internet tablet designed for the developing world. The paper further discusses the process though which vulnerabilities were identified on the device, as well as the capabilities of each exploit. The authors also discuss the potential attacks which could be carried out against users’ ex., Lockscreen Bypass, Theft of User Data, Installation of a keylogger etc.

The third contribution "Comparative Investigation of ARP Poisoning Mitigation Techniques Using Standard Testbed for Wireless Networks" by Goldendeep Kaue et al, discusses and compares various techniques to protect the users from the attacks like man-in-the-middle, denial of service, IPspoofing etc. Techniques like command prompt, Ettercap,Wireshark and snort are used to identify the attacks. Finally, a comparative analysis is made taking time and scalability into consideration.

The fourth contribution comprises an information security risk assessment of smartphone use in Finland using Bayesian networks. The paper titled "Information Security Risk Assessment of smartphones Using Bayesian Networks" by Kristian Herland et al. uses a knowledge-based approach method to build a causal Bayesian network model of information security risks and consequences. The papers primary objective is to perform a high-level risk assessment of information security related to smartphone usage. Secondary objective of the paper is to design and implement a practical risk assessment process for eliciting information from multiple experts and consolidation this information into a Bayesian network. The paper concludes by giving a Bayesian network model of information security risks, which can be used for various purposes such as scenario and sensitivity analysis.

The fifth paper titled "Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-Crimes" by Ezer Osei Yeboah-Boateng et al. addresses the key challenges such as intangibility, complications and inconsistencies associated with the investigations and presentation of prosecutorial artefacts in digital forensics. The paper unearths the digital truth about malwares and cyber-criminal activities. Furthermore, the study carries out malware analysis, in order to determine the malware activities or operations to comprehend the malware behaviour and analyse the working of the malware codes.

The sixth paper titled "Factors Influencing the Continuance Use of Mobile Social Media: The Effect of Privacy Concerns" by Kwame Simpe Ofori et al. examines privacy concerns in the continuance use of Mobile Social Media.The paper explores the effects of factors such as Perceived Ease of Use, Perceived Usefulness and Perceived Risk and Perceived Enjoyments on Satisfaction and Continuance intention. The papers further analyse a survey data collected Editorial Foreword: Special Issue on Cybersecurity, Privacy and Trust vii from 262 GTUC students using the Partial Least Square approach to Structural Equation Modelling with the use of SmartPLS software.

The seventh contribution discusses various metrics to calculate the trust and evaluation of trust score to determine the trust the user has with the friends in their social network. The paper titled "Confidentiality in Online Networks; A Trust-based Approach" by Vedashree K. Takalkar proposes an architecture that will build trust evaluation system. The paper also discusses the Trust Rule to achieve access control scheme.

Together these seven contributions describe the diversity and range of cybersecurity including trust and privacy. Continued growth in web- and cloud services promoted by the interrelated development of technologies and calls for ever more advanced information societies make these societies increasingly vulnerable to cybercrime and dependant on securing privacy and trust. This implies that more research in these areas is urgently needed as they essential and needed elements in establishing and stabilizing the future services-technology ecosystem.

Samant Khajuria, Camilla Bonde, Roslyn Layton, Knud Erik Skouby
Lene Tolstrup Sørensen, CMI - Center for Communication, Media and Information technologies,
Aalborg University January 2016

River Publishers: Journal of Cyber Security and Mobility