Program of the Workshop 2020

Time (EST)

Time (CET)

Title of the talk

Presenter/Author

09:00-09:05

15:00-15:05

Opening Remarks and Welcome

Andrii Shalaginov

09:05-09:15

15:05-15:15

S08216: Modern Cybercrime Investigation: technological advancement of Smart Devices and legal aspects of corresponding digital transformation

Andrii Shalaginov, Marina Shalaginova, Aleksandar Jevremovic, Marko Krstic

09:15-09:30

15:15-15:30

S08203: Towards verifiable evidence generation in forensic-ready systems

Lukas Daubner, Martin Macak, Barbora Buhnova, and Tomas Pitner

09:30-09:55

15:30-15:55

S08205: Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis

Yogesh Kulkarni and Anurag Gorkar

09:55-10:20

15:55-16:20

S08214: Detection of Previously Unseen Malware using Memory Access Patterns Recorded Before the Entry Point

Sergii Banin and Geir Olav Dyrkolbotn

10:20-10:45

16:20-16:45

S08204: Cyber Espionage: Reloaded

Keynote speaker: Ashwin Ram

Check Point Software Technologies, Australia

10:45-11:10

16:45-17:10

S08213: Real-Time Detection of Fake-Shops through Machine Learning

Louise Beltzung, Andrew Lindley, Olivia Dinica, Nadin Hermann, and Raphaela Lindner

11:10-11:30

17:10-17:30

Coffee Break

11:30-11:55

17:30-17:55

S08215: CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning

Linn-Mari Kristiansen, Vinti Agarwal, Katrin Franke, and Raj Sanjay Shah

11:55-12:10

17:55-18:10

S08211: Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis

Asif Iqbal, Johannes Olegård, Ranjana Ghimire, Shirin Jamshir, and Andrii Shalaginov

12:10-12:35

18:10-18:35

S08212: Never-Ending Learner for Malware Analysis (NELMA)

Moumita Kamal and Douglas Talbert

12:35-13:00

18:35-19:00

Live: Using AI to protect children from online threats

Keynote speaker: Aleksandar Jevremovic

Singidunum University, Serbia

13:00-13:45

19:00-19:45

Lunch break

13:45-14:10

19:45-20:10

S08210: Centrality and Scalability Analysis on Distributed Graph of Large-Scale E-mail Dataset for Digital Forensics

Selim Ozcan, Merve Astekin, Narasimha Karpoor Shashidhar, and Bing Zhou

14:10-14:35

20:10-20:35

S08209: Exploring Open Source Information for Cyber Threat Intelligence

Victor Adewopo, Bilal Gonen, and Festus Adewopo

14:35-15:00

20:35-21:00

S08202: Machine Learning Methods for Anomaly Detection in Industrial Control Systems

Johnathan Tai, Izzat Alsmadi, Yunpeng Zhang, and Fengxiang Qiao

15:00-15:20

21:00-21:20

Coffee Break

15:20-15:35

21:20-21:35

S08201: National Security Intelligence through Social Network Data Mining

Nnaemeka Ekwunife

15:35-15:50

21:35-21:50

S08206:Financial Fraud Detection using Deep Support Vector Data Description

Masoud Erfani, Farzaneh Shoeleh, and Ali A. Ghorbani

15:50-15:55

21:50-21:55

Closing Remarks

Andrii Shalaginov

 

Program v. 24.11.2020 (timeslotes are in EST and CET timezones)

Introduction and Scope

Following the positive feedback and great interest last year, we are delighted to announce the 4th International Workshop on Big Data Analytic for Cybercrime Investigation and Prevention, co-located with IEEE Big Data 2020 conference in Atlanta, Georgia, USA that takes place VIRTUALLY on December 10-13, 2020.


Covid-19 Information

The safety and well-being of all conference participants is our priority. After evaluating the current COVID-19 situation, the decision has been made to transform the in-person component of IEEE Big Data 2020 into an all-digital conference experience – IEEE Big Data 2020 will now be an online event. Therefore, IEEE BigData 2020 will no longer take place in Atlanta, Georgia, US and will instead take place virtually. The conference dates remain the same – December 10-13, 202

The big data paradigm has become an inevitable aspect of today's digital forensics investigations. Acquiring a forensic copy of seized data mediums already takes several hours due to the increasing storage size. In addition are several other time-consuming laboratory analysis steps required, such as evidence identification, corresponding data preprocessing, analysis, linkage, and final reporting. These steps have to be repeated for every physical device examined in the criminal case. Conventional digital forensics data preprocessing and analysis methods struggle when handling the contemporary variety, variability, volume and velocity of case data. Thus, proactive approaches have to be developed and integrated in daily law enforcement operations; for timely detection and prevention of the illegal activities in a data-intensive environments. Thus, there is a need for advanced big data analytics to aid in cyber crime investigations, which requires novel approaches for automated analysis. This workshop is organized to bring together recent development in big data analysis to aid in current challenges in cybercrime investigations.

Research Topics of Interest

The topics of the workshop are as following, but not limited to:

Algorithm areas

- Machine Learning-aided analysis

- Graph-based detection

- Topic modelling

- Improvements of existing methods

- Decision Support Systems

Data

- Novel datasets

- New data formats

- Digital Forensics data simulation

- Anonymised case data

- New data formats and taxonomies

Infrastructure

- Secure collaborative platforms

- Distributed storage and processing

- Technologies for data streams

- Hardware / software architectures for large-scale data

Application areas

- Cyber Threats Intelligence

- Network Forensics Readiness

- Malware Analysis & Detection

- Emails mining & Authorship Identification

- Social Network Mining

- Events correlations

- Access Logs analysis

- Mobile Forensics

- Fraud Detection

- Database Forensics

- IoT Forensics

- Blockchain technologies

- Industrial systems

Important dates

Oct 20 (extended Oct 05), 2020: Due date for full workshop paper submissions

Nov 10 (extended Nov 1), 2020: Notification of paper acceptance to authors

Nov 20 (extended Nov 10), 2020: Latest due date for camera-ready of accepted papers

Dec 10-13 , 2020: Workshops and conference

Program Chairs

  • Andrii Shalaginov

    Norwegian University of Science and Technology
    andrii.shalaginov@ntnu.no

  • Asif Iqbal

    KTH Royal Institute of Technology & CEO Athena Labs
    asif.iqbal@ee.kth.se

  • Igor Kotsiuba

    Pukhov Institute for Modelling in Energy Engineering
    igor.kotsiuba@pimee.edu.ua

  • Mamoun Alazab

    Charles Darwin University
    mamoun.alazab@cdu.edu.au

Technical Program Committee

Ajit Kumar (VIT Bhopal)

Aleksandar Jevremovic (Singidunum University)

Bing Zhou (Sam Houston State University)

Cristian Bucur (Ecole Polytechnique de Montréal)

Holger Morgenstern (Albstadt-Sigmaringen University)

Junaid Arshad (Birmingham City University)

Inna Skarga-Bandurova (Pukhov Institute for Modelling in Energy Engineering)

Marko Krstic (Regulatory Agency for Electronic Communications and Postal Service)

Mohamed Abomhara (Norwegian University of Science and Technology)

Mohannad Alhanahnah (University of Wisconsin-Madison)

Naw Safrin Sattar (University of New Orleans)

Ogerta Eleza (University of Tirana)

Olaf M. Maennel (Tallinn University of Technology)

Raffaele Olivieri (Arma dei Carabinieri – Ra.C.I.S.)

Sanjay Kumar (University of Jyväskylä)

Shih-Chieh Su (‎Amazon)

Sule Yildirim Yayilgan (Norwegian University of Science and Technology)

Thippa Reddy G (Vellore Institute Of Technology)

Vasileios Mavroeidis (University of Oslo)

Vinayakumar Ravi (University of Cincinnati)

Vinti Agarwal (Birla Institute of Technology and Science, Pilani)

Keynote Speakers

Aleksandar Jevremovic

Singidunum University, Serbia

Title: Using AI to protect children from online threats

Abstract: Children are one of the most vulnerable groups of Internet users. They are exposed to an increasing number of threats, including predators, cyberbullying, pornography and nudity, different types of indoctrination, etc. Additionally, children are spending more time online due to general technology trends, pandemics, learning activities, and many other reasons. Supervising them all the time is not a realistic solution - parents lack enough time for such an approach, children's privacy would be violated, and some types of threats wouldn't be recognized or processed adequately even by the parents. In this paper, we present our experiences with using AI to address the aforementioned problems that we collected during the current development of an EU/NGI funded project - CASPER.

Bio: Aleksandar Jevremovic works as a full professor at the Faculty of Informatics and Computing, and as a researcher at School of Electrical Engineering in Serbia, a guest lecturer at Harvard University, and an external consultant at American Public University System in the USA, and as a visiting scholar at the Cyprus University of Technology in Cyprus. He serves as a Serbian representative at the Technical Committee on Human–Computer Interaction of the UNESCO International Federation for Information Processing. Currently, he is a leader of the Next Generation Internet funded project for protecting children online - Casper.

Ashwin Ram

Check Point Software Technologies, Australia

Title: Cyber Espionage: Reloaded

Abstract: COVID-19 has forced the closure of many international boarders, which has led to an increase in cyber espionage activities. In this session Ashwin Ram, Cyber Security Evangelist from Check Point Software Technologies will shed light on how a recent cyber-espionage campaign was discovered by the Check Point Incident Response Team. He will explain how the threat actors gained access to government agencies, the clever techniques used by threat actors to stay persistent and hidden. This operation, which Check Point was able to attribute to the Naikon APT group, used a new backdoor named Aria-body, in order to take control of the victims’ networks. Ashwin will also shed light on countries that are currently being targeted by this threat actor.

Bio: As a Cyber Security Evangelist at Check Point Software Technologies, Ashwin Ram helps business leaders make smarter, more insightful cyber-security decisions. He does this by ensuring that cyber-security strategies are designed to achieve cyber-resilience. He focuses on both, pre and post infection security controls across corporate networks, cloud, endpoints, mobileand IoT. Ashwin has delivered technical trainings, cyber-security boot camps, assisted with designing and remediating cyber-security solutions across many organisations within APAC. He is passionate about cyber-securityand regularly shares his knowledge on the current threat landscape at various cyber-security conferences across the globe.

Paper Submission

The authors are invited to submit: full-length papers (up to 10 pages IEEE 2-column format), short papers (4-6 pages IEEE 2-column format) or abstract papers (up to 4 page IEEE 2-column format) through the online submission system. Page count includes references, figures and tables.

Paper Submission Page

Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines (see link to "formatting instructions" below) using Letter page format (8.5" x 11").

LaTex Formatting Macros or DOC

Publication

The authors of accepted papers must guarantee their presence at the conference for the papers to be published in the conference proceedings. At least one author of each accepted paper must register for the conference in order to include the paper in the proceedings.

Special Issue

Extended papers should have at least 60% of new material and will be sent through a review process to ensure the quality of contributions. Selected papers will be nominated for submission to:

1. Special Issue on Artificial Intelligence for Cyber Defence and Smart Policing (AICDSP), journal Future Generation Computer Systems LINK.

2. Special Issue on Forensics Data Analytics Enhancement via Artificial Intelligences and Big Data Analytics, MDPI Future Internet journal LINK.